Trust Center
At Inquira Health, we are committed to maintaining the highest standards of security, privacy, and compliance. Our Trust Center provides transparent access to our security practices, compliance certifications, and data protection policies.
Security Controls Overview
Last update: March 2025
Data Region
Explore our comprehensive security controls and compliance measures. Click on each section to learn more about specific controls and their implementation.
Risk Profile
View more
Security Controls
View more
Infrastructure
View more
Data Privacy & GDPR
View more
AI Governance & EU AI Act
View more
Legal & Compliance
Disaster Recovery & Testing
View more
Incident Response
View more
Reports & Assessments
Risk Profile
Data Classification
All customer data is classified as Internal or Confidential. Sensitive data is handled according to strict internal security policies on a need-to-know basis.
Data Access Level
Role-based access with Multi-Factor Authentication (MFA) and audit logging is enforced across all relevant systems.
Hosting
We utilize EU-based major cloud providers. For details, see our sub-processors list.
AI Risk Level (EU AI Act)
Our AI is classified as limited-risk under the EU AI Act for administrative use with human oversight, but may be high-risk if used for clinical purposes. Learn more.
Security Controls
Audit Logging & Monitoring
Detailed audit logs are maintained for all system activity and retained according to our data retention policy. Call logs are also accessible to customers in the dashboard.
Data Security
- Encryption: AES-256 encryption at rest, TLS 1.3 + TLS-SRTP for media streams in transit.
- Password Requirements (per NIST):
- Minimum 20 characters
- Three of four character types (uppercase, lowercase, numbers, special characters)
- Multi-Factor Authentication (MFA) enforced
Access Control
Role-based access control (RBAC) plus MFA is enforced across all environments containing confidential or internal data.
Secure Development Lifecycle
Our CI/CD pipeline includes code scanning, security testing, and automated checks to identify vulnerabilities before deployment.
Monitoring Approach
24/7 real-time monitoring of all systems with on-call support. We maintain a public status page for transparency.
Infrastructure
EU-Based Hosting
We host our services in EU data centers provided by major cloud vendors. See our sub-processors list for details.
Resilient & Isolated Environments
Production and non-production environments are strictly isolated. Servers are replicated for fault tolerance and high availability.
Zero Trust Implementation
We leverage a Zero Trust architecture using WireGuard for secure networking and strict identity-based access controls.
Continuous Monitoring
All infrastructure components are monitored 24/7 for performance, availability, and security indicators.
Data Privacy & GDPR
DPIA Summary
We conduct Data Protection Impact Assessments (DPIA) to identify and mitigate privacy risks.
Data Subject Rights
We fully support GDPR data subject rights (access, rectification, erasure, etc.) with streamlined processes.
Data Retention & Erasure Policy
We maintain clear guidelines on data lifecycle management, including secure deletion.
Privacy Documentation
Our Privacy Policy and Data Processing Agreement (DPA) are publicly available.
AI Governance & EU AI Act
AI Risk Classification
Our platform is classified as a limited-risk AI system under the EU AI Act when used for administrative tasks with human oversight. Use in clinical or diagnostic settings may fall under high-risk classification. Learn more in our EU AI Act page.
Human Oversight Built In
We design workflows to ensure human validation and accountability throughout the AI interaction lifecycle.
LLM Governance
We apply strict prompt control, link extractions to source transcripts, and leverage Azure OpenAI's content filtering to maintain safe and compliant outputs.
Traceability of Extracted Data
All call transcripts are viewable in the product. When the AI extracts structured data (e.g. date of birth), we clearly show which part of the transcript it was derived from—ensuring auditability and contextual traceability.
Legal & Compliance
Standard DPA
We offer a standardized Data Processing Agreement (DPA) to our customers.
Subprocessor List
We perform security assessments of our third-party processors and update the list of sub-processors regularly.
Acceptable Use Policy
Our platform usage guidelines and restrictions to prevent misuse and maintain compliance.
Disaster Recovery & Testing
Disaster Recovery Plan
We maintain and review our Disaster Recovery (DR) plan on a quarterly basis. The plan outlines key recovery procedures, contact protocols, and infrastructure dependencies across Supabase, Hetzner, and AWS.
Redundancy & Backups
Our core database is managed by Supabase in the EU and has daily encrypted backups.
Recovery Objectives
Our current disaster recovery targets include:
- RPO (Recovery Point Objective): ≤ 24 hours
- RTO (Recovery Time Objective): ≤ 4 hours
Uptime SLA
We target a 99.9% availability SLA across our services, with infrastructure-level monitoring in place to minimize downtime.
DR Testing & Documentation
We conduct scheduled disaster recovery drills and document outcomes.
Incident Response
24/7 Monitoring & Alerting
We maintain continuous security monitoring and alerting for quick incident detection.
Breach Notification Process
A clearly defined communication workflow ensures timely breach notifications to all stakeholders.
Security Contact
For security incidents or queries view responsible disclosure policy.
Root Cause Analysis
We provide RCAs for all security incidents. These are available to affected customers upon request.
Reports & Assessments
Vulnerability Scan Reports
Regular automated vulnerability scanning of our infrastructure and applications.
Contact Information
Inquira Technologies B.V.
Dutch Chamber of Commerce Number (KvK): 95495460
Rotterdam, The Netherlands
For responsible disclosure of security vulnerabilities, please visit our responsible disclosure page.