How we handle your hospital's data.

Plain answers for security, IT, and compliance teams. base9health is built to PDPA standards (Singapore and Malaysia), aligned with regional MOH guidelines, and ready to support HIPAA for hospitals that need it. Verifiable answers, not just our word for them.

Trust overview Five areas Ready
  • 01PDPA & PDPCAligned with Singapore and Malaysia data-protection law.Ready
  • 02EncryptionIn transit and at rest, industry-standard.Configured
  • 03IdentitySSO via Okta, Entra, Ping. SCIM provisioning.Configured
  • 04Data residencyPHI stays in your contracted region.By contract
  • 05Audit logsEvery action logged with user and reason.Built-in

How we handle data.

A short version of what's in our trust package.

01

PDPA-aligned, by design.

Built to Singapore PDPA and Malaysia PDPA standards, with the Advisory Guidelines for the Healthcare Sector applied throughout. HIPAA support available for hospitals serving U.S. or international patients. Data Protection Agreement signed before any production data touches the platform.

02

Encryption everywhere.

Data is encrypted in transit (TLS 1.2+) and at rest (AES-256). Single-tenant deployments support customer-managed keys.

03

Identity and access.

SSO via your existing identity provider (Okta, Microsoft Entra, Ping). SCIM for automated provisioning. MFA enforced for all internal access.

04

Region-bounded data.

PHI stays in the region your contract specifies. No data leaves that region without a contractual amendment.

05

Verifiable audit logs.

Every user action is logged with timestamp, user, and reason. Logs are exportable to your security or audit team's existing tools.

Security details.

For the security teams who want the line-by-line.

  1. 01

    Encryption.

    TLS 1.2+ in transit. AES-256 at rest. Envelope encryption per tenant. Customer-managed keys available for single-tenant deployments where required by contract.

  2. 02

    Identity.

    SAML 2.0 and OIDC for SSO. SCIM 2.0 for automated provisioning. MFA enforced for all internal access. No shared credentials. Hardware-key-backed admin path.

  3. 03

    Access control.

    Role-based access, with attribute-based scoping at the row level. Production access is just-in-time, peer-approved, time-bound, and recorded.

  4. 04

    Data residency.

    PHI is stored in the region specified by your contract. Cross-region replication is opt-in only and never includes PHI without an explicit amendment.

  5. 05

    Vulnerability management.

    Continuous monitoring, regular third-party penetration testing, and a published remediation policy. Findings are tracked openly with prospects under MNDA.

  6. 06

    Personnel.

    Background checks for everyone with production access. Annual security and data-protection training (PDPA, HIPAA where relevant). Engineering on-call carries a security pager.

  7. 07

    Sub-processors.

    Public sub-processor list with advance notice on changes. Contractual flow-down of PDPA and HIPAA controls where applicable.

  8. 08

    Incident response.

    24/7 on-call. Customer notification within contractual SLA, tracked from a public status page. Post-incident reviews shared with affected customers.

Trust package

Send us your security questionnaire.

We'll send back our security policy (PDPA + HIPAA where applicable), the most recent third-party pen-test summary, our sub-processor list, our DPA / BAA templates, and our trust portal credentials. Most teams get what they need within two business days under MNDA.