Security and Privacy at Pamastay

Security is at the core of what we do at Pamastay


We follow the following security practices and policies

Least privilege & just‑in‑time access

Access to systems and data is role‑based, time‑bound, and logged. Elevated access requires approval and MFA.


Minimum necessary & purpose limitation

We only use PHI/PII for the specific task authorized by our customers, and only the minimum data needed to do it.


Data minimization & retention

We collect the least data required, retain it only as long as necessary, then securely delete according to a published schedule.

De‑identification & aggregation by design.

Customer‑directed use of PHI

No use of PHI for product improvement, model training, or benchmarking without explicit customer approval and a signed DUA; de‑identified/synthetic data is used by default.


Encryption & key management

Data is encrypted in transit and at rest; keys are managed in a hardened KMS with strict separation of duties.


Environment segregation

No PHI in development or test environments. Strict data flow controls and secrets management across environments.


Data quality, lineage & cataloging

We track data provenance, transformations, and owners to ensure accuracy and accountability for every dataset.


Auditability & comprehensive logging

All access and changes are logged and monitored; customers can request access logs for their data.


Vendor & subprocessor governance

Vendors are risk‑rated, contractually bound to equivalent controls, and reviewed regularly; our current list is published.


Secure SDLC & change management

Security reviews, code scanning, dependency checks, and change approvals are built into every release.


Incident response & breach notification

Clear SLAs for triage, containment, customer notification, and post‑incident review are publicly documented.


Privacy by design & user rights

We integrate privacy impact assessments into features and honor applicable rights (HIPAA individual rights; GDPR where relevant).

Data Protection

Data at rest

Data are encrypted at rest - All data encrypted at rest with field-level encryption or key management.

Data in transit

Data are encrypted in transit - Pamastay uses TLS 1.2 or higher and features such as HTTPS and GLP encryption.

Data encryption

Encryption keys - Pamastay manages encryption through the Amazon Web Services Key Management System.

HIPAA compliance isn't just an industry standard - it's a personal commitment. The data we care for could be ours, yours, or family.


If you have any questions, get in touch to learn more: compliance@pamastay.com

SOC II Certification

Pamastay is SOC II Type I Certified. We believe that dual compliance is a requirement to manage health information responsibly.


If you have any questions, get in touch to learn more: compliance@pamastay.com

Pamastay welcomes reports from security researchers to help us keep our users safe.

Our bug bounty program covers

pamastay.com | app.pamastay.com | api.pamastay.com


Email compliance@pamastay.com to learn more.


Risk Intelligence for Healthcare Providers

From Claim to Contract

Company

© 2025. All rights reserved. Pamastay, Inc.

166 Geary Street. STE 1500 #2471. San Francisco, CA. 94108

@pamastay

Risk Intelligence for Healthcare Providers

From Claim to Contract

Company

© 2025. All rights reserved. Pamastay, Inc.

166 Geary Street. STE 1500 #2471. San Francisco, CA. 94108

@pamastay

Risk Intelligence for Healthcare Providers

From Claim to Contract

Company

© 2025. All rights reserved. Pamastay, Inc.

166 Geary Street. STE 1500 #2471. San Francisco, CA. 94108

@pamastay