Security

Security at Rely Technologies

Patient data security is non-negotiable. Here's how we protect every byte of health data on our platform.

Last updated: May 18, 2026

Encryption

AES-256 encryption at rest and TLS 1.3 in transit for all patient data.

ISO 27001:2022

Certified Information Security Management System audited annually.

India Data Centres

Hosted exclusively on MEITY-empanelled data centres ensuring data sovereignty.

Role-Based Access

Granular RBAC ensures staff only access data relevant to their role.

Audit Trails

Every access, modification, and deletion is logged with timestamp and user identity.

24/7 Monitoring

Continuous infrastructure monitoring with automated threat detection and alerting.

Data Encryption

  • All patient data stored in our systems is encrypted using AES-256, the same standard used by financial institutions and government agencies.

  • All data transmitted between your systems and ours is protected by TLS 1.3, preventing interception or tampering in transit.

  • Database backups are encrypted and stored in geographically separate locations within India.

  • Encryption keys are managed using industry-standard key management practices with regular rotation.

Infrastructure Security

  • Our cloud infrastructure is hosted exclusively on MEITY-empanelled data centres in India, ensuring full data sovereignty and compliance with Indian data localisation requirements.

  • We maintain a 99.9% uptime SLA with redundant systems, automatic failover, and disaster recovery capabilities.

  • Network security includes Web Application Firewalls (WAF), DDoS protection, intrusion detection systems, and regular penetration testing.

  • All infrastructure components are patched and updated on a regular schedule to address known vulnerabilities.

Access Controls

  • Role-Based Access Control (RBAC) ensures that every user — from doctors to billing staff — only has access to the data and functions relevant to their role.

  • Multi-factor authentication (MFA) is available and recommended for all administrative accounts.

  • Session management includes automatic timeout, concurrent session controls, and IP-based access restrictions.

  • All privileged access is logged, monitored, and subject to regular access reviews.

Compliance & Certifications

  • ISO 27001:2022 certified — our Information Security Management System is independently audited annually.

  • ABDM certified by the National Health Authority, Government of India — compliant with all ABDM data privacy and security guidelines.

  • Compliant with the Digital Personal Data Protection (DPDP) Act 2023 and IT Act 2000.

  • NABH and NABL ready — our systems support the documentation and audit trail requirements for hospital and lab accreditation.

  • HL7 FHIR R4 compliant for secure, standardised health data exchange.

Vulnerability Management

  • We conduct regular internal and third-party penetration testing of our platform.

  • A responsible disclosure programme allows security researchers to report vulnerabilities to security@relyhealthtech.com.

  • Critical security patches are deployed within 24 hours of identification. Non-critical patches follow a regular monthly cycle.

  • We maintain a Software Bill of Materials (SBOM) and monitor all third-party dependencies for known vulnerabilities.

Incident Response

  • We maintain a documented Incident Response Plan that is tested and updated annually.

  • In the event of a security incident affecting patient data, we will notify affected organisations within 72 hours as required by applicable law.

  • Our security team is available 24/7 to respond to incidents. Contact us at security@relyhealthtech.com.

  • Post-incident reviews are conducted for all significant security events to prevent recurrence.

Employee Security

  • All employees undergo background verification before joining.

  • Security awareness training is mandatory for all staff and conducted quarterly.

  • Employees with access to production systems are subject to enhanced vetting and regular access reviews.

  • A clear desk and screen lock policy is enforced across all offices.

Reporting a Security Issue

  • If you believe you have discovered a security vulnerability in our systems, please report it responsibly to security@relyhealthtech.com.

  • Please include a description of the vulnerability, steps to reproduce, and potential impact.

  • We will acknowledge your report within 48 hours and keep you informed of our progress.

  • We do not take legal action against researchers who report vulnerabilities in good faith.

Found a security issue?

Report it responsibly and we'll respond within 48 hours.

info@relyhealthtech.com