Security and Privacy at Okaya

Security

Protecting Your Data at Every Layer

At Okaya, safeguarding the data of every user is our highest priority. We've implemented a comprehensive, multi-layered security strategy designed to protect your information from unauthorized access and malicious actors. Our approach leverages cutting-edge technologies, compliance with regulations, and a strong emphasis on empowering you with control over your data.

Our security measures are validated through participation in the NSA Cybersecurity program and other security initiatives led by AWS.

Security

Our Multi-Layered Security Approach

Secure Infrastructure

Leveraging AWS for world-class security standards and advanced tools.

Zero Trust Security

Implementing 'never trust, always verify' principles for all access requests.

Regulatory Compliance

Adhering to HIPAA, GDPR, FISMA, and other relevant standards.

Advanced Security

Employing encryption, access controls, and continuous monitoring.

User Empowerment

Providing full control and transparency over personal data.

Continuous Improvement

Upholding ethical standards and constantly enhancing security measures.

Employee Training

Ongoing education in security best practices for all staff.

Vendor Management

Careful oversight of third-party vendors to ensure compliance.

Zero Trust Security Model
  • Never Trust, Always Verify: Every access request is authenticated and authorized
  • Micro-Segmentation: Systems divided into secure zones
  • Continuous Authentication: Ongoing identity verification with MFA support
Advanced Security Measures
  • Encryption: TLS for data in transit, AWS encryption for data at rest
  • Access Controls: Role-Based Access Control (RBAC) and internal access restrictions
  • Monitoring and Auditing: Real-time system monitoring with AWS CloudTrail
  • Incident Response Plan: Swift addressing of security incidents
  • Audit Trails: Logging of all platform actions for accountability
Continuous Improvement and Ethical Standards
  • Ethical Research: IRB-approved protocols for data acquisition and usage
  • PHI Data Protection: Special security measures for health information
  • Transparent Practices: Clear communication of data policies
Protecting Against Threats
  • Threat Detection: Real-time identification and blocking of suspicious activity
  • Regular Updates: Routine system updates to address vulnerabilities
  • Secure Development: Security integrated throughout the software development lifecycle