The Artera Security Program maintains robust security standards for protecting the integrity, confidentiality, availability, and privacy of the data we store and transmit. We hold ourselves to the highest standards for safeguarding your organization and the patients you serve.
“Artera’s security program is particularly impressive, and security has clearly been a primary focus since the company’s beginning. Artera has made sure to consider the end-to-end data flow process, and they’ve conscientiously deployed all the necessary controls to best address safety, privacy, and potential risk.”
Deepak Chaudhry
BDO, National Health IT & HITRUST Leader, President of Houston HIMSS Chapter
As the gold standard for organizations in healthcare, Artera has been HITRUST certified since 2019. The HITRUST CSF is a rigorous set of controls that covers, among other sources, all the requirements of HIPAA. At Artera, we’ve mapped our security controls to ensure we’re compliant with both HITRUST and HIPAA. Download our HITRUST certificate here.
Used by more than 60,000 companies worldwide, establishes requirements for forming, implementing, maintaining, and continually improving an ISMS. This standard serves as the foundation upon which the other ISO 27000 standards are built. Download our ISO 27001 certificate here.
Extends supplementary requirements for the implementation of information security controls for cloud services. Download our ISO 27001 certificate here.
Establishes requirements for the formation, implementation, maintenance, and continuous improvement of a PIMS to protect the privacy and processing of personal data. Artera has been certified against the ISO 27701 standard as a data processor. Download our ISO 27701 certificate here.
Provides further requirements beyond ISO 27701 for the protection of personally identifiable information (PII) within cloud environments. Download our ISO 27001 certificate here.
A SOC 2 Type 2 report is a third-party audit that assesses a company’s security controls and practices over a specified period of time. The report details how well the company’s internal controls protect customer data and are operating.