Security

Enterprise-grade security for healthcare data.

Patient data deserves the highest level of protection. Our security architecture is built from the ground up to meet NHS requirements and exceed industry standards.

ISO 27001
Certified
Cyber Essentials+
Certified
DSPT
Standards Exceeded
UK Only
Data Residency

Our Approach

Security by design

Security isn't bolted on to Medelic - it's fundamental to how we build. Every architectural decision, from database design to API structure, considers security implications first.

We apply the principle of least privilege throughout our systems. Access to patient data is strictly controlled, logged, and regularly audited. No one at Medelic can access patient information without explicit authorisation and a valid clinical or operational reason.

Our security team conducts regular penetration testing, vulnerability assessments, and code reviews. We maintain a private bug bounty programme and work with independent security researchers to identify and fix potential issues.

End-to-End Encryption

All data encrypted in transit (TLS 1.3) and at rest (AES-256). Encryption keys managed through dedicated HSMs.

UK Data Centres

All patient data stored exclusively in UK-based, NHS-approved data centres. No data ever leaves UK jurisdiction.

Continuous Monitoring

24/7 security monitoring with automated threat detection and response. Real-time alerting for suspicious activity.

Data Protection

How we protect patient data

Data Minimisation

We only collect and process data that's necessary for the clinical purpose. No data is retained beyond its required retention period.

  • Purpose-limited collection
  • Automated retention policies
  • Secure deletion procedures

Access Controls

Strict role-based access controls ensure only authorised personnel can access patient data, with full audit trails of all access.

  • Role-based permissions
  • Multi-factor authentication
  • Session management

Audit Logging

Comprehensive audit logs record all data access and system changes, retained securely for compliance and investigation purposes.

  • Immutable audit trails
  • Real-time monitoring
  • Forensic analysis capability

Questions about our security?

We're happy to discuss our security architecture in detail with your IT and IG teams. Get in touch to arrange a technical deep-dive.