Security
Product
FOBOH Security Overview
4 Dec 2024
Introduction
FOBOH takes Information Security and Compliance very seriously. This document is designed to help reassure our customers that their data is handled in a manner that meets their data protection and compliance requirements, and to provide full transparency and peace of mind for FOBOH customers and assure them that their information is in good hands.
Our security controls and mechanisms are based on the ISO 27001 Information Security Standard and NIST Standards, which include programs covering: Policies and Procedures, Access Control, Business Continuity, HR Security, Network Infrastructure Security, Third-Party Security, Vulnerability Management, as well as Incident Response.
Security Organisation
FOBOH has a formal Information Security team that is responsible for all security matters in the organization. Our security team holds a variety of certifications and other credentials that attest to their proficiency in the field.
Human Resources Security
Background Checks and NDAs
FOBOH employees undergo an extensive third-party background check prior to formal employment offers, wherever local regulations and employment standards permit. All FOBOH employees must sign non-disclosure agreements before gaining access to company systems or data.
Awareness and Training
Education is something that is central to an effective Information Security program; without it, the technical controls cannot effectively protect patient data and other sensitive information
Identification and Access Management
FOBOH follows a formal process to grant or revoke access to its resources. System access is based on the concepts of “least-possible-privilege” and a “need-to-know” basis to ensure that authorized access is consistent with the defined responsibilities. All employees are required to use a unique ID to access company systems. FOBOH enforces an industry-standard corporate password policy. This policy requires passwords to change every 90 days. It also stipulates a minimum password length of 10 characters, along with complexity requirements, including special characters, upper and lowercase characters, and numbers. We also enforce Multi-Factor authentication (e.g. physical security keys) and single sign-on solutions.
Privacy and Date Retention
FOBOH maintains a Privacy Program. You can learn more about privacy and data retention here .