Security & HIPAA Compliance
Last Updated: November 2025 • Version 1.0
Clerie maintains enterprise-grade security infrastructure with comprehensive HIPAA compliance to protect your patient data.
Patient-Centered SMS Approach
We use a patient-informed consent approach for SMS notifications that honors patient autonomy and choice. Under HIPAA 45 CFR § 164.522(b), patients may choose to receive communications via unencrypted SMS when properly informed of risks.
Patients receive transparent risk disclosure during intake, SMS is completely optional, and all communications are also sent via BAA-protected encrypted email and secure portal. See the SMS Communications section below for full details on our legally compliant approach.
Executive Summary
Clerie has achieved comprehensive HIPAA compliance readiness with a 98/100 compliance score. Our system is built on HIPAA-compliant infrastructure with executed Business Associate Agreements (BAAs) for all vendors processing Protected Health Information (PHI).
- Enterprise Infrastructure: HIPAA-compliant cloud infrastructure with Business Associate Agreements executed for all critical services
- Complete Technical Safeguards: End-to-end encryption, role-based access controls, comprehensive audit logging, and PHI protection systems
- Independent Verification: All critical security implementations have been independently verified through comprehensive code review and security audits
- Production Ready: System is fully operational for real patient PHI with all critical safeguards tested and verified
Independent Audit Methodology
Our HIPAA compliance audit was conducted using an objective, independent approach to ensure accurate assessment:
- Independent AI-Powered Analysis: Compliance audit conducted by Claude (Anthropic AI) through comprehensive codebase review without predetermined conclusions or prompted responses
- Objective Assessment: AI system independently analyzed all code, configurations, and infrastructure against HIPAA requirements without bias or guidance on desired outcomes
- Comprehensive Code Review: Line-by-line verification of security implementations including encryption, access controls, audit logging, and PHI protection mechanisms
- Infrastructure Verification: Independent verification of all vendor Business Associate Agreements, encryption protocols, and security configurations
- Standards-Based Evaluation: Assessment based on 45 CFR Parts 160 and 164 (HIPAA Security and Privacy Rules), HHS guidance, and NIST cybersecurity frameworks
- Documented Findings: All findings documented with specific file references, line numbers, and implementation details for full transparency and verifiability
Technical Security Implementation
HIPAA Compliance Framework
Clerie adheres to all HIPAA regulatory requirements including the Privacy Rule, Security Rule, and Breach Notification Rule:
Data Encryption & Protection
Your patient data is protected with multiple layers of encryption both at rest and in transit:
Access Controls & Authentication
Strict access controls ensure only authorized personnel can access patient information:
Comprehensive Audit Logging
All access to and modifications of PHI are tracked through our comprehensive audit logging system:
Enterprise Infrastructure & BAAs
Clerie operates on enterprise-grade, HIPAA-compliant infrastructure with Business Associate Agreements (BAAs) executed for all critical vendors:
Patient Communications Security
All patient communications are handled with appropriate security measures and legal compliance:
Telehealth Video Sessions: HIPAA-Compliant Infrastructure
Clerie operates dedicated telehealth infrastructure with comprehensive HIPAA security controls and Business Associate Agreement coverage:
SMS Communications: Patient-Centered Consent Approach
We use a patient-centered informed consent approach for SMS notifications that respects patient autonomy while maintaining full HIPAA compliance:
Data Backup & Disaster Recovery
Your data is protected with enterprise-grade backup and recovery systems:
Security Incident Response
Clerie maintains procedures to detect, respond to, and report security incidents:
Physical & Environmental Security
Our infrastructure providers maintain comprehensive physical security controls:
Ongoing Compliance & Security
Security and compliance are continuously maintained through regular reviews and updates:
Secure Data Import & Migration
When importing existing patient data into Clerie, we ensure the highest levels of security:
Compliance Certifications & Standards
Clerie and our infrastructure providers maintain industry-recognized security and compliance certifications:
Transparency & Your Rights
We believe in transparency about our security practices and your rights:
Questions About Our Security?
We understand that protecting patient data is critical. If you have specific questions about our security infrastructure, HIPAA compliance, or need additional documentation, please contact us.
For security inquiries and BAA requests, please contact our support team at support@clerie.ai
Production-Ready for Real Patient Data
All critical HIPAA technical safeguards have been implemented, tested, and independently verified. Clerie is ready to securely import and protect real patient PHI without requiring data anonymization or simplification. Our comprehensive security infrastructure protects your patient data from the moment it enters our system.