top of page

InsightAlly Security and Compliance Overview 

Purpose

This memorandum provides a summary of the security, privacy, and regulatory compliance posture of InsightAlly for prospective customers, partners, and diligence reviewers.  

Regulatory and Compliance Alignment  

HIPAA

InsightAlly is architected to comply with the HIPAA Privacy Rule, Security Rule, and Breach Notification Rule. The platform supports use by covered entities and business associates through documented administrative, physical, and technical safeguards, including role-based access controls, least-privilege enforcement, audit logging, and in-boundary handling of protected health information.

SOC 2

InsightAlly’s information security program is aligned with the AICPA Trust Services Criteria. A SOC 2 Type 1 audit is in final stages with the report expected imminently. SOC 2 Type 2 controls are in operation and the corresponding audit is in progress.

HECVAT

InsightAlly aligns with the Higher Education Community Vendor Assessment Toolkit and is completing formal HECVAT documentation. Responses are supported by documented control evidence.

Infrastructure and Hosting

InsightAlly is hosted in a private Amazon cloud environment using HIPAA-eligible AWS services for all workloads involving protected health information. Environments are segregated, secured through private networking controls, and managed through controlled change management processes. 

AI and AWS Bedrock Architecture  

InsightAlly is hosted in a private Amazon cloud environment using HIPAA-eligible AWS services for all workloads involving protected health information. Environments are segregated, secured through private networking controls, and managed through controlled change management processes. 

AI and AWS Bedrock Architecture  

InsightAlly uses AWS Bedrock as its managed foundation model layer. AWS Bedrock foundation models are pre-trained, and AWS does not use customer inputs or outputs to train its base models.  

 

Any model fine-tuning involving protected health information occurs solely within a BAA-covered AWS environment using HIPAA-eligible configurations. InsightAlly does not permit training or fine-tuning with PHI outside such environments.  

 

Logging and monitoring services are configured within HIPAA-compliant boundaries. Access logs and workflow logs are protected, retained under policy, and reviewed for audit and incident response purposes.  

 

Only foundation models supported under AWS HIPAA-eligible services are used for PHI workloads. InsightAlly does not route PHI to external third-party model infrastructure outside AWS Bedrock.  

Data Protection and Encryption  

All data at rest is encrypted using AES-256. Data in transit is encrypted using TLS 1.2 or higher. Encryption keys are centrally managed with role-based access and rotation policies.  

Access Controls and Governance

InsightAlly enforces role-based access controls aligned to user personas, multi-factor authentication for administrative access, segregation of duties, and auditable workflow execution.  

 

The platform operates as a governed support layer and does not modify or override customer systems of record.  

Incident Response and Third-Party Risk  

InsightAlly maintains a documented incident response plan with defined escalation, notification, and remediation procedures. Vendor and service providers are reviewed under a third-party risk management process.  

 

Customer data is not resold, reused, or used for generalized AI model training.

Conclusion  

InsightAlly’s security and compliance posture emphasizes documented controls, regulatory alignment, and auditable operations. Detailed policies, audit materials, and diligence documentation are available under NDA upon request. 

ChatGPT Image Jan 30, 2026, 08_26_39 PM.png

Discover How We Can Help

No matter the industry, company size, or challenge—InsightAlly transforms possibilities into realities. Explore what we can achieve together.

bottom of page