Protecting your data at every layer

Okaya recognizes that there is not a single tool or technique that can be deployed to make sure our users' data is not only protected but also that our users can properly control their sharing and privacy options. To do so, we rely on several standards:
We rely on AWS and leverage:
World-Class Security Standards
Compliance with ISO 27001, SOC 2, and PCI DSS
Utilizing AWS KMS, CloudTrail, and Guard Duty
Scalability and Reliability: High availability and performance for diverse user groupsGovCloud
Support: Deployment options for government customers
Regional Hosting: Leveraging AWS regions for full compliance
Data Loss Prevention: AWS-native tools for encryption and secure backups
Data Minimization: Collecting only necessary data to reduce exposure
Never Trust, Always Verify: Every access request is authenticated and authorized
Micro-Segmentation: Systems divided into secure zones
Continuous Authentication: Ongoing identity verification with MFA support
Ethical Research: IRB-approved protocols for data acquisition and usage
PHI Data Protection: Special security measures for health information
Transparent Practices: Clear communication of data policies
Opt-In Model: Active consent required for data sharing
Data Transparency: Clear view of data access and usage
Consent Management: Easy-to-use tools for managing permissionsAccess and Portability: Anytime access to your data and portable copies available
Safeguarding Protected Health Information
Respecting data privacy rights
CMMC Alignment: Robust protections for controlled unclassified information
IRB Approval: Ethical research practices approved by Institutional Review Boards
Data Sovereignty: Ensuring data remains within specified jurisdictions