Inquira Health Logo

Trust Center

At Inquira Health, we are committed to maintaining the highest standards of security, privacy, and compliance. Our Trust Center provides transparent access to our security practices, compliance certifications, and data protection policies.

EU AI Act

Security Controls Overview

Last update: March 2025

Data Region

Explore our comprehensive security controls and compliance measures. Click on each section to learn more about specific controls and their implementation.

Risk Profile

Data Classification
Data Access Level
Hosting

View more

Security Controls

Audit Logging & Monitoring
Data Security
Access Control

View more

Infrastructure

EU-Based Hosting
Resilient & Isolated Environments
Zero Trust Implementation

View more

Data Privacy & GDPR

DPIA Summary
Data Subject Rights
Data Retention & Erasure Policy

View more

AI Governance & EU AI Act

AI Risk Classification
Human Oversight Built In
LLM Governance

View more

Legal & Compliance

Standard DPA
Subprocessor List
Acceptable Use Policy

Disaster Recovery & Testing

Disaster Recovery Plan
Redundancy & Backups
Recovery Objectives

View more

Incident Response

24/7 Monitoring & Alerting
Breach Notification Process
Security Contact

View more

Reports & Assessments

Vulnerability Scan Reports

Risk Profile

Data Classification

All customer data is classified as Internal or Confidential. Sensitive data is handled according to strict internal security policies on a need-to-know basis.

Data Access Level

Role-based access with Multi-Factor Authentication (MFA) and audit logging is enforced across all relevant systems.

Hosting

We utilize EU-based major cloud providers. For details, see our sub-processors list.

AI Risk Level (EU AI Act)

Our AI is classified as limited-risk under the EU AI Act for administrative use with human oversight, but may be high-risk if used for clinical purposes. Learn more.

Security Controls

Audit Logging & Monitoring

Detailed audit logs are maintained for all system activity and retained according to our data retention policy. Call logs are also accessible to customers in the dashboard.

Data Security

  • Encryption: AES-256 encryption at rest, TLS 1.3 + TLS-SRTP for media streams in transit.
  • Password Requirements (per NIST):
    • Minimum 20 characters
    • Three of four character types (uppercase, lowercase, numbers, special characters)
    • Multi-Factor Authentication (MFA) enforced

Access Control

Role-based access control (RBAC) plus MFA is enforced across all environments containing confidential or internal data.

Secure Development Lifecycle

Our CI/CD pipeline includes code scanning, security testing, and automated checks to identify vulnerabilities before deployment.

Monitoring Approach

24/7 real-time monitoring of all systems with on-call support. We maintain a public status page for transparency.

Infrastructure

EU-Based Hosting

We host our services in EU data centers provided by major cloud vendors. See our sub-processors list for details.

Resilient & Isolated Environments

Production and non-production environments are strictly isolated. Servers are replicated for fault tolerance and high availability.

Zero Trust Implementation

We leverage a Zero Trust architecture using WireGuard for secure networking and strict identity-based access controls.

Continuous Monitoring

All infrastructure components are monitored 24/7 for performance, availability, and security indicators.

Data Privacy & GDPR

DPIA Summary

We conduct Data Protection Impact Assessments (DPIA) to identify and mitigate privacy risks.

Data Subject Rights

We fully support GDPR data subject rights (access, rectification, erasure, etc.) with streamlined processes.

Data Retention & Erasure Policy

We maintain clear guidelines on data lifecycle management, including secure deletion.

Privacy Documentation

Our Privacy Policy and Data Processing Agreement (DPA) are publicly available.

AI Governance & EU AI Act

AI Risk Classification

Our platform is classified as a limited-risk AI system under the EU AI Act when used for administrative tasks with human oversight. Use in clinical or diagnostic settings may fall under high-risk classification. Learn more in our EU AI Act page.

Human Oversight Built In

We design workflows to ensure human validation and accountability throughout the AI interaction lifecycle.

LLM Governance

We apply strict prompt control, link extractions to source transcripts, and leverage Azure OpenAI's content filtering to maintain safe and compliant outputs.

Traceability of Extracted Data

All call transcripts are viewable in the product. When the AI extracts structured data (e.g. date of birth), we clearly show which part of the transcript it was derived from—ensuring auditability and contextual traceability.

Legal & Compliance

Standard DPA

We offer a standardized Data Processing Agreement (DPA) to our customers.

Subprocessor List

We perform security assessments of our third-party processors and update the list of sub-processors regularly.

Acceptable Use Policy

Our platform usage guidelines and restrictions to prevent misuse and maintain compliance.

Disaster Recovery & Testing

Disaster Recovery Plan

We maintain and review our Disaster Recovery (DR) plan on a quarterly basis. The plan outlines key recovery procedures, contact protocols, and infrastructure dependencies across Supabase, Hetzner, and AWS.

Redundancy & Backups

Our core database is managed by Supabase in the EU and has daily encrypted backups.

Recovery Objectives

Our current disaster recovery targets include:

  • RPO (Recovery Point Objective): ≤ 24 hours
  • RTO (Recovery Time Objective): ≤ 4 hours

Uptime SLA

We target a 99.9% availability SLA across our services, with infrastructure-level monitoring in place to minimize downtime.

DR Testing & Documentation

We conduct scheduled disaster recovery drills and document outcomes.

Incident Response

24/7 Monitoring & Alerting

We maintain continuous security monitoring and alerting for quick incident detection.

Breach Notification Process

A clearly defined communication workflow ensures timely breach notifications to all stakeholders.

Security Contact

For security incidents or queries view responsible disclosure policy.

Root Cause Analysis

We provide RCAs for all security incidents. These are available to affected customers upon request.

Reports & Assessments

Vulnerability Scan Reports

Regular automated vulnerability scanning of our infrastructure and applications.

Contact Information

Inquira Technologies B.V.

Dutch Chamber of Commerce Number (KvK): 95495460

Rotterdam, The Netherlands

For responsible disclosure of security vulnerabilities, please visit our responsible disclosure page.