Trust and Compliance

Compliance and Security

Last Updated: March 2026

AIXIS operates with a defense-in-depth security model and a compliance program designed for modern healthcare software delivery. This page provides a high-level summary of our controls, governance approach, and customer enablement resources.

Compliance obligations vary by organization, jurisdiction, and deployment model. Customers should evaluate this information with their legal, privacy, and security teams and map it to their own regulatory obligations.


1. Compliance Program Foundations

Our compliance model combines policy governance, technical safeguards, administrative controls, and continuous monitoring. Security and privacy requirements are embedded throughout product design, development, deployment, and operations.

2. Healthcare and Privacy Alignment

AIXIS is designed to support customers operating under frameworks such as HIPAA, GDPR, and related local healthcare privacy regulations. Where required, contractual addenda such as BAAs or DPAs are available to define each party's responsibilities for regulated data processing.

3. Core Security Controls

  • Encryption in transit and at rest using current industry standards.
  • Role-based access controls, least privilege, and account lifecycle governance.
  • Tenant isolation architecture to protect organizational boundaries.
  • Comprehensive audit logging for key events and administrative actions.
  • Vulnerability management, patching cadence, and secure configuration baselines.

4. Monitoring and Incident Response

We maintain security monitoring processes with escalation procedures for suspicious activity, service degradation, and confirmed incidents. Incident response workflows include triage, containment, remediation, recovery, and post-incident review.

5. Availability and Business Continuity

Platform reliability is supported through redundancy, backup processes, and operational runbooks. Recovery objectives and continuity procedures are maintained for critical services and reviewed as part of operational governance.

6. Third-Party and Vendor Management

AIXIS evaluates service providers that may process or host customer data and applies contractual and security due diligence requirements. Access to customer data by vendors is limited to defined business purposes and governed by confidentiality and security controls.

7. Customer Shared Responsibility

Security and compliance outcomes are strongest when responsibilities are shared clearly. Customers are responsible for user provisioning, endpoint security, local policy enforcement, and lawful use of patient and personal data within their organization.

8. Documentation and Requests

Enterprise customers may request compliance documentation, contractual safeguards, and trust package details through the AIXIS team, subject to confidentiality and applicable disclosure controls.


For compliance questions, documentation requests, or legal addenda, contact legal@aixis.com or visit our Terms of Service.