Privacy & Security

Protecting your data at every layer

Secure Infrastructure

Regulatory Compliance

Continous improvements

User Empowerement

The technology

Our Multi-Layered Security Approach

Okaya recognizes that there is not a single tool or technique that can be deployed to make sure our users' data is not only protected but also that our users can properly control their sharing and privacy options. To do so, we rely on several standards:

Infrastructure Security

We rely on AWS and leverage:

World-Class Security Standards
Compliance with ISO 27001, SOC 2, and PCI DSS
Utilizing AWS KMS, CloudTrail, and Guard Duty

Scalability and Reliability: High availability and performance for diverse user groupsGovCloud

Support: Deployment options for government customers

Regional Hosting: Leveraging AWS regions for full compliance

Data Loss Prevention: AWS-native tools for encryption and secure backups

Data Minimization: Collecting only necessary data to reduce exposure

Zero Trust

Never Trust, Always Verify: Every access request is authenticated and authorized

Micro-Segmentation: Systems divided into secure zones

Continuous Authentication: Ongoing identity verification with MFA support

Ethical Standards

Ethical Research: IRB-approved protocols for data acquisition and usage

PHI Data Protection: Special security measures for health information

Transparent Practices: Clear communication of data policies

You Own your data

Opt-In Model: Active consent required for data sharing

Data Transparency: Clear view of data access and usage

Consent Management: Easy-to-use tools for managing permissionsAccess and Portability: Anytime access to your data and portable copies available

Regulations Compliance

Safeguarding Protected Health Information

Respecting data privacy rights

CMMC Alignment: Robust protections for controlled unclassified information

IRB Approval: Ethical research practices approved by Institutional Review Boards

Data Sovereignty: Ensuring data remains within specified jurisdictions