Security and Privacy at Fertu

Security and Privacy at Fertu

Security and Privacy at Fertu

Security is at the heart of what we do. We exist to communicate with patients on behalf of healthcare organizations, which means we are responsible for safeguarding extremely sensitive information every minute of every day. Protecting that data — technically, procedurally, and contractually — is core to the product, not an afterthought.


These practices are continuously monitored and independently audited over time, not just at a single point in time.

Security is at the heart of what we do. We exist to communicate with patients on behalf of healthcare organizations, which means we are responsible for safeguarding extremely sensitive information every minute of every day. Protecting that data — technically, procedurally, and contractually — is core to the product, not an afterthought.


These practices are continuously monitored and independently audited over time, not just at a single point in time.

Security is at the heart of what we do. We exist to communicate with patients on behalf of healthcare organizations, which means we are responsible for safeguarding extremely sensitive information every minute of every day. Protecting that data — technically, procedurally, and contractually — is core to the product, not an afterthought.


These practices are continuously monitored and independently audited over time, not just at a single point in time.

Governance

Fertu’s Security and Privacy teams define controls, monitor them, and provide evidence to third-party auditors to prove those controls are working.

Our security program is built on four principles:

Least privilege
Access is limited to only those with a legitimate business need, and is always provisioned following the principle of least privilege.

Defense in depth
We layer technical, procedural, and monitoring controls to reduce blast radius and detect issues quickly (“defense in depth”).

Consistent enforcement
Security controls are applied consistently across engineering, infrastructure, and operations, not just in production-facing code.

Continuous improvement
We continuously mature our controls to increase effectiveness and auditability while minimizing friction for our team and our customers.

Compliance

SOC 2 Type II

Fertu maintains a SOC 2 Type II attestation.
A SOC 2 Type II report evaluates not only that appropriate security controls exist, but that they actually operated effectively over an extended period of time. That makes it more rigorous than a point-in-time SOC 2 Type I review.


We provide our most recent SOC 2 Type II report to customers and qualified prospects under NDA.

HIPAA

Fertu is designed for HIPAA compliance. We act as a Business Associate, and our platform supports HIPAA-compliant handling of Protected Health Information (PHI) across outreach channels (SMS, phone, mail, and email). We execute Business Associate Agreements (BAAs) with covered entities and upstream business associates, and we limit PHI use/disclosure to the “minimum necessary” required to perform patient engagement on their behalf.

Product Security
Secure Development Lifecycle

Every code change to the Fertu platform goes through review and automated scanning before it’s allowed to reach production. We run:

  • Static Application Security Testing (SAST) during pull requests and on a recurring basis

  • Software Composition Analysis (SCA) to identify known vulnerabilities in open source dependencies

  • Malicious dependency scanning to reduce software supply chain risk

  • Dynamic Application Security Testing (DAST) of running services

  • Network vulnerability scanning of exposed surfaces

  • Continuous attack-surface monitoring to identify any unexpected internet-facing assets

Penetration Testing

We engage independent penetration testers with deep application and infrastructure expertise at least annually. The engagement covers our application, APIs, and cloud infrastructure, with source code made available to maximize coverage and exploit realism.


We make summary penetration test reports available upon request.

Vulnerability Management
Vulnerability Management
Vulnerability Management

Findings from static/dynamic analysis, supply chain scans, and penetration tests are triaged, prioritized based on risk and exploitability, and tracked through remediation. Urgent findings are addressed via hotfix procedures and configuration changes in production infrastructure.

Findings from static/dynamic analysis, supply chain scans, and penetration tests are triaged, prioritized based on risk and exploitability, and tracked through remediation. Urgent findings are addressed via hotfix procedures and configuration changes in production infrastructure.

Network Access & Remote Access

Production services run inside private Google Cloud VPCs. Public ingress is tightly controlled and audited. Internal services (databases, job runners, schedulers) are reachable only through private VPC connectors. Access is brokered through Google’s Cloud SQL Auth Proxy (“CloudProxy”), which enforces authenticated, encrypted connections. We enforce malware-blocking DNS servers and egress restrictions to limit outbound connections from sensitive environments.

Vendor Security

We use a risk-based vendor review process. Vendors that could access PHI, communicate with patients on our customers’ behalf, or connect to production infrastructure are evaluated for security posture before onboarding. We assess factors including the type of data involved (especially PHI), level of access to production systems, potential operational or reputational impact. Vendors with higher inherent risk require stronger controls and contractual assurances before use.

Identity & Access Management

All workforce access to production systems is enforced through Google SSO. Production access requires strong authentication, is role-scoped, and follows least-privilege provisioning and periodic review.

All corporate laptops are centrally managed. We enforce disk encryption, automatic screen lock, OS and patch baselines, and anti-malware/EDR tooling. Device posture is monitored continuously.

Data Privacy & PHI Handling

We handle PHI and other sensitive patient information only for the purpose our customers authorize (for example: outreach about a benefit they’re eligible for, or helping them schedule an Annual Wellness Visit). We do not sell PHI, share PHI for marketing unrelated to our customers’ programs, or use PHI to build unrelated data products.

We also maintain records of consent and opt-out where applicable, and we honor unsubscribe / “stop” requests across channels. This operational discipline — knowing who we’re allowed to contact, why, and in which language or modality — is fundamental to our platform, not just a legal checkbox.

Because we work with U.S. healthcare organizations and do not market to EU consumers, we are not currently a Privacy Shield / GDPR processor. Our focus is HIPAA, data minimization, and provable controls mapped to SOC 2 Type II.

Availability & Status

Fertu production infrastructure runs on Google Cloud Platform (GCP). We deploy using containerized services and managed databases, with monitoring and alerting on uptime, performance, and security signals. We are continuously improving our redundancy and recovery posture to meet healthcare-grade expectations for reliability.

We maintain audit trails for access, configuration changes, and data flows, and we make evidence (for example, SOC 2 Type II report, summary pen test findings) available to customers under NDA.

Ready to transform your marketing?

Try Fertu, the simplified, secure & compliant all-in-one solution

© 2024 Fertu. All Rights Reserved.

Ready to transform your marketing?

Try Fertu, the simplified, secure & compliant all-in-one solution

© 2024 Fertu. All Rights Reserved.