myCARI Security Practices

Last Updated: January 11, 2026Version: 1.3

Our Commitment to Security

At myCARI, protecting your health information is our top priority. We employ industry-leading security measures to ensure your data remains private and secure. As a healthcare application handling Protected Health Information (PHI), we implement security controls that meet or exceed HIPAA requirements.

Compliance Framework

StandardStatusDescription
HIPAAImplementedSecurity controls aligned with HIPAA requirements; BAA signed with GCP
SOC 2 Type IIVia InfrastructureGCP infrastructure is SOC 2 certified; myCARI follows SOC 2 security principles
GDPRImplementedData protection practices aligned with GDPR requirements
CCPAImplementedCalifornia Consumer Privacy Act requirements addressed

Note: myCARI uses HIPAA-compliant infrastructure (Google Cloud Platform with signed BAA) and implements security controls aligned with these standards. Formal third-party certification audits are planned for future phases.

Technical Security Measures

Encryption

LayerTechnologyDetails
In TransitTLS 1.3All network communications use the latest TLS encryption
At RestAES-256All stored health data encrypted with industry-standard encryption
Key ManagementGoogle Cloud KMSAutomatic key rotation, hardware security modules
End-to-EndCurve25519 + AES-256-GCMCare team messages encrypted on-device before transmission

End-to-End Messaging Encryption

Care team messages are protected with true end-to-end encryption:

ComponentImplementation
Key ExchangeCurve25519 ECDH (Elliptic Curve Diffie-Hellman)
Message EncryptionAES-256-GCM authenticated encryption
Private Key StorageiOS Keychain (device-only, protected by Face ID/Touch ID)
Public Key StorageFirebase Firestore (for key exchange between users)
Key GenerationAutomatic on login, regenerated as needed

How it works:

  • Messages are encrypted on your device before being sent
  • Only the sender and intended recipients can decrypt messages
  • The server only stores encrypted data - it cannot read your messages
  • Conversation previews show “Encrypted message” to protect content
  • Each recipient receives a uniquely encrypted copy using their public key

Authentication

FeatureImplementation
Biometric LoginFace ID and Touch ID support (recommended)
Password RequirementsMinimum 6 characters with Firebase Auth
Social Sign-InApple Sign-In, Google Sign-In available
Session ManagementToken-based sessions with automatic expiration
Token SecurityJWT tokens with short expiration, secure refresh flow
Brute Force ProtectionRate limiting and account protection mechanisms

Infrastructure Security

ComponentDetails
Cloud ProviderGoogle Cloud Platform (HIPAA BAA signed)
Data CentersGCP SOC 2 certified data centers, US-based (multiple regions)
Load BalancingGlobal HTTPS Load Balancer with SSL/TLS termination
Web Application FirewallCloud Armor with OWASP rule sets, DDoS protection
Network SecurityVPC isolation with private networking
DatabaseCloud SQL with AES-256 encryption, private IP connectivity
Secrets ManagementGoogle Secret Manager for all credentials
MonitoringCloud Logging, Cloud Monitoring, and automated alerting

Application Security

PracticeDetails
Secure DevelopmentSecurity-first development practices, code reviews
Dependency ScanningAutomated vulnerability scanning for all dependencies
API SecurityRate limiting, request validation, OAuth 2.0
Input ValidationAll user input sanitized and validated
Error HandlingSecure error messages that don't expose system details

Data Isolation and Multi-Tenancy

Per-User Data Isolation

myCARI implements strict data isolation to ensure user data cannot be accessed by other users:

FeatureImplementation
Container IsolationEach user's health data stored in isolated SwiftData containers
Database SeparationUser data partitioned with row-level security
Care Team AccessPermission-based access with full audit logging
Professional ModeProfessional caregivers have separate audit trails

Care Team Security

When you invite care team members:

  • Each member has permission-controlled access
  • All access is logged with timestamps
  • You can revoke access instantly
  • Professional caregivers have enhanced audit logging for HIPAA compliance

Organizational Security

Access Control

ControlDescription
Role-Based Access (RBAC)Staff access limited to job requirements
Least PrivilegeMinimum necessary access for all staff
Background ChecksAll employees undergo security screening
Access ReviewsQuarterly reviews of all access permissions
Separation of DutiesCritical functions require multiple approvals

Staff Training

TrainingFrequency
HIPAA TrainingAnnual certification for all staff
Security AwarenessQuarterly training and updates
Phishing SimulationMonthly exercises to test awareness
Incident ResponseAnnual tabletop exercises

Vendor Security

All third-party vendors with access to PHI must:

  • Sign Business Associate Agreements (BAA)
  • Meet our security requirements
  • Demonstrate appropriate security controls
  • Use HIPAA-compliant infrastructure

Incident Response

Response Capabilities

CapabilityDetails
24/7 MonitoringAutomated security event monitoring
Incident Response TeamDedicated security personnel
Response ProceduresDocumented incident response playbooks
Regular DrillsQuarterly incident response exercises

Breach Notification

In the event of a data breach:

  • Affected users notified within 72 hours (per HIPAA requirements)
  • HHS Office for Civil Rights notified as required
  • Full investigation conducted with detailed reporting
  • Remediation measures implemented immediately

Audit Logging

We maintain comprehensive audit logs of all security-relevant activities:

Event TypeDetails Logged
AuthenticationLogin attempts, logouts, password changes
Data AccessAll access to health information
Data ModificationsChanges to health records, medications, vitals
Care Team ActionsMember additions, removals, permission changes
Administrative ActionsAccount changes, settings modifications
API AccessAll API calls with timestamps and results
MessagingMessage sent/received events (metadata only, not content)

Retention Policy

AspectImplementation
Retention Period6 years per HIPAA requirements
EnforcementAutomated via database retention columns
CleanupMonthly automated cleanup of expired logs
ImmutabilityAudit logs cannot be modified after creation

All audit log entries include a retention_expires_at timestamp set to 6 years from creation. Logs are automatically purged after this period while ensuring HIPAA compliance.

Your Role in Security

Best Practices for Users

To help keep your health data secure:

PracticeWhy It Matters
Use a strong passwordPrevents unauthorized account access
Enable Face ID/Touch IDAdds biometric layer of protection
Keep your iPhone updatedSecurity patches protect against vulnerabilities
Keep myCARI updatedApp updates include security improvements
Don't share your loginYour credentials are for your use only
Log out on shared devicesPrevents others from accessing your data
Review care team accessPeriodically verify who has access to your data
Report suspicious activityAlert us if you notice anything unusual

Reporting Security Issues

If you discover a security vulnerability:

Email: security@mlpipes.ai

Guidelines:

  • Provide detailed information about the vulnerability
  • Do not publicly disclose until we've addressed it
  • We appreciate responsible disclosure

We do not pursue legal action against security researchers who act in good faith, avoid accessing others' data, report issues responsibly, and give us reasonable time to respond.

Healthcare Provider Security

FHIR/SMART on FHIR Integration

When connecting to healthcare providers:

Security MeasureImplementation
OAuth 2.0Industry-standard authorization protocol
PKCEProof Key for Code Exchange prevents code interception
Token StorageAccess tokens stored encrypted on backend
Scope LimitingOnly request necessary data permissions
Session ManagementAutomatic token refresh, secure expiration

Epic MyChart Security

  • Connections authenticated directly through Epic's secure OAuth flow
  • myCARI never sees your Epic login credentials
  • You can revoke access anytime through Epic MyChart
  • Epic sandbox available for testing (developers only)

Physical Security

Data Center Security

Our cloud infrastructure (Google Cloud Platform) maintains:

  • 24/7 physical security with access controls
  • Biometric access to data center facilities
  • Video surveillance and security personnel
  • Environmental controls (fire suppression, climate control)
  • Redundant power and networking

Device Security (Your iPhone)

We recommend:

  • Enable device passcode (6-digit minimum)
  • Use Face ID or Touch ID
  • Enable Find My iPhone for remote wipe capability
  • Keep iOS updated to latest version
  • Don't jailbreak your device

Questions?

Address:
MLPipes LLC
5725 S Valley View Blvd Ste 5 PMB 471045
Las Vegas, Nevada 89118-3122 US