Trust Center — Privacy, Security & Compliance

EPI SOFTWARE SOLUTIONS operates a healthcare-grade Software-as-a-Service (SaaS) platform designed for compliance with
GDPR, UK GDPR, HIPAA, SOC 2, and ISO/IEC 27001.

EPI SOFTWARE SOLUTIONS supports independent clinics, multi-location providers, enterprise healthcare organizations, and regulated medical service operators.

Privacy Policy

Customers act as Data Controllers. EPI SOFTWARE SOLUTIONS acts as a Data Processor under GDPR and a Business Associate under HIPAA. Personal data and Protected Health Information are processed solely to provide contracted services.

HIPAA Business Associate Agreement (BAA)

1. Definitions (HIPAA)

  • Covered Entity has the meaning set forth in 45 CFR §160.103.
  • Business Associate means EPI SOFTWARE SOLUTIONS as defined in 45 CFR §160.103.
  • Protected Health Information (PHI) has the meaning set forth in 45 CFR §160.103.
  • Security Incident has the meaning set forth in 45 CFR §164.304.
  • Breach has the meaning set forth in 45 CFR §164.402.

2. Permitted Uses and Disclosures

  • Provision of SaaS services under the master services agreement
  • System administration, maintenance, and security operations
  • Compliance with applicable law and regulatory obligations

PHI is never used for advertising, marketing, profiling, or unrelated analytics.

3. Safeguards

  • Administrative, technical, and physical safeguards per 45 CFR §164
  • Encryption of PHI at rest and in transit
  • Role-based access controls and least-privilege enforcement
  • Comprehensive audit logging and monitoring

4. Breach Notification

EPI SOFTWARE SOLUTIONS shall notify the Covered Entity without unreasonable delay and no later than 60 days following discovery of a Breach.

5. Subcontractors

All subcontractors with access to PHI are subject to written agreements imposing HIPAA-equivalent obligations.

6. Termination

Upon termination, PHI shall be returned or securely destroyed. If destruction is infeasible, protections shall survive indefinitely.

This Agreement may be executed electronically. Signed HIPAA Business Associate Agreements are available upon request.

GDPR Data Processing Agreement (DPA)

1. Definitions (GDPR)

  • Personal Data has the meaning set forth in Article 4(1) GDPR.
  • Processing has the meaning set forth in Article 4(2) GDPR.
  • Controller has the meaning set forth in Article 4(7) GDPR.
  • Processor has the meaning set forth in Article 4(8) GDPR.
  • Special Categories of Data has the meaning set forth in Article 9 GDPR.

2. Roles

  • Controller: Healthcare Provider
  • Processor: EPI SOFTWARE SOLUTIONS

3. Subject Matter & Purpose

Processing of healthcare, administrative, and operational data to provide clinic management SaaS services.

4. Processor Obligations

  • Process data only on documented instructions (Article 28)
  • Maintain confidentiality commitments
  • Implement appropriate technical and organizational measures (Article 32)
  • Assist with data subject rights requests
  • Notify personal data breaches within 72 hours

5. International Transfers

Cross-border transfers are safeguarded using Standard Contractual Clauses (SCCs) and UK International Data Transfer Agreements (IDTA), where applicable.

Signed GDPR Data Processing Agreements are available upon request.

Incident Response & Breach Handling

  • 24/7 security monitoring and alerting
  • Incident classification and escalation procedures
  • Customer notification workflows
  • Post-incident investigation and remediation

Availability & Service Level Commitments

  • Target uptime: 99.9%
  • Redundant cloud infrastructure
  • Daily encrypted backups
  • Disaster recovery and business continuity testing

Formal Service Level Agreements are provided contractually.

Sub-Processors

All sub-processors are vetted and contractually bound to equivalent data protection, confidentiality, and security obligations.

Category Purpose Region
Cloud Infrastructure Hosting and data storage EU / US
Email Delivery Transactional communications Global
Monitoring & Logging Security and reliability EU / US

Regulatory Mapping

Framework Coverage
HIPAA Privacy Rule, Security Rule, Breach Notification Rule
GDPR Articles 5, 6, 9, 28, 32, 33
SOC 2 Security, Availability, Confidentiality
ISO 27001 Risk, Access Control, Incident Management, Continuity

Document Governance

  • Version: 1.0
  • Effective Date: January 1, 2026
  • Review Cycle: Annual

Material changes are communicated contractually or through the platform.

Country & Jurisdiction-Specific Annexes

EPI SOFTWARE SOLUTIONS provides jurisdiction-specific data protection and compliance annexes to support local regulatory requirements and supervisory authority expectations. These annexes form part of the contractual data protection framework.

  • European Union (EU): Country-specific GDPR annexes (e.g., Germany, France, Netherlands), including local supervisory authority references and health data nuances.
  • United Kingdom (UK): UK GDPR annex, incorporating the Data Protection Act 2018 and UK International Data Transfer Agreement (IDTA).
  • United States (US): HIPAA-focused annexes aligned with federal requirements and applicable state-level healthcare privacy laws.
  • Other Jurisdictions: Annexes for Canada (PIPEDA), Australia (Privacy Act), and other regions are available upon request.

Annexes are provided during procurement, contract negotiation, or regulatory review processes.

Control-to-Regulation Mapping

EPI SOFTWARE SOLUTIONS maintains a formal control mapping that links internal security, privacy, and operational controls directly to regulatory and assurance frameworks. This mapping supports audits, customer due diligence, and regulatory inspections.

Framework Mapped Controls Purpose
HIPAA Administrative, Technical, Physical Safeguards Healthcare privacy and security compliance
GDPR / UK GDPR Articles 5, 6, 9, 28, 30, 32, 33 Lawful processing and data protection
SOC 2 CC Series Controls Security, availability, confidentiality assurance
ISO/IEC 27001 Annex A Controls Information Security Management System (ISMS)

Control-to-regulation mapping documentation is available under NDA.

SOC 2 Reports & Audit Evidence

EPI SOFTWARE SOLUTIONS undergoes independent third-party audits to validate the effectiveness of its security and availability controls.

  • SOC 2 Type I: Design of controls at a point in time
  • SOC 2 Type II: Operating effectiveness over a review period

SOC 2 reports include coverage of:

  • Security
  • Availability
  • Confidentiality

Reports and supporting audit evidence are made available to customers and prospects under a non-disclosure agreement (NDA).

Trust Center Portal

EPI SOFTWARE SOLUTIONS maintains a centralized Trust Center portal for customers, partners, and regulators to access compliance documentation.

The Trust Center includes:

  • Privacy Policy, HIPAA BAA, and GDPR DPA
  • Sub-processor lists and updates
  • SOC 2 reports and certifications
  • Security whitepapers and architecture overviews
  • Incident response summaries and notifications

Access to restricted materials is governed by role-based permissions and contractual requirements.

Procurement & Due Diligence Support

EPI SOFTWARE SOLUTIONS supports customer procurement, legal, compliance, and information security teams throughout vendor risk assessment processes.

  • Security questionnaires (SIG, CAIQ, custom)
  • Data protection impact assessments (DPIAs)
  • Vendor risk and compliance reviews
  • Regulatory inquiry and audit support

Dedicated compliance and security contacts are available to support enterprise and regulated customers.

Automated Change Logs

EPI SOFTWARE SOLUTIONS implements an automated change log system for all compliance-related documents, configurations, and platform updates.

  • Tracks changes to Privacy Policy, BAA, DPA, and security policies
  • Maintains timestamped version history accessible to authorized personnel
  • Supports audit requests and regulatory reviews
  • Enables proactive notifications to customers and stakeholders

This system ensures transparency and traceability for all compliance artifacts.

Real-Time Sub-Processor Notifications

EPI SOFTWARE SOLUTIONS provides real-time notifications to customers regarding changes to sub-processors or new engagements that may involve personal data or PHI.

  • Immediate notification for new sub-processors with relevant scope
  • Updates to existing sub-processor contracts, security posture, or certifications
  • Centralized reporting via Trust Center portal
  • Ability to review and object to sub-processors within contractual notice period

This process ensures customers maintain continuous oversight over their data.

Signed Artifact Downloads

Customers and authorized partners can download signed and timestamped copies of key compliance documents directly from the Trust Center.

  • Privacy Policy (PDF + digital signature)
  • HIPAA Business Associate Agreement (BAA)
  • GDPR Data Processing Agreement (DPA)
  • SOC 2 and ISO/IEC 27001 certificates
  • Sub-processor agreements and attestation letters

All downloads are cryptographically verified and tamper-evident, ensuring regulatory defensibility.

Public / Private Trust Center

EPI SOFTWARE SOLUTIONS operates a dual-layer Trust Center to optimize transparency and security:

  • Public Trust Center: High-level compliance overview, SOC 2 summary, standard privacy policies, and certifications
  • Private Trust Center: Customer-specific artifacts, signed agreements, audit reports, sub-processor details, and detailed operational evidence

Access is controlled via identity management and role-based permissions, ensuring that sensitive compliance information is only available to authorized users.

Automated Regulatory Updates

EPI SOFTWARE SOLUTIONS maintains a system that monitors regulatory changes impacting HIPAA, GDPR, UK GDPR, ISO 27001, SOC 2, and other applicable frameworks.

  • Tracks regulatory guidance, laws, and standards changes in real-time
  • Automatically flags impacted policies, controls, and customer obligations
  • Generates update recommendations for internal teams and customers
  • Ensures continuous compliance with minimal manual intervention

This automated approach enhances agility, reduces risk, and supports enterprise-level regulatory governance.