We are dedicated to keeping your calls confidential and your company’s data secure. If you’re signing up for an Enterprise plan, we’d be happy to do a security assessment.
Bridge is powered by InnoCaption, a certified IP Captioned Telephone Service (IP CTS) provider regulated by the Federal Communications Commission (FCC). We adhere to stringent security protocols to ensure the integrity and confidentiality of all communications.
To validate the policies and protocols we use to protect customer data, Bridge has undergone a third-party SOC 2 audit assessing our information security practices against key criteria like security, availability, and confidentiality. The compliance report can be made available during security assessments.
To validate the policies and protocols we use to protect customer data, Bridge has undergone a third-party SOC 2 audit assessing our information security practices against key criteria like security, availability, and confidentiality. The compliance report can be made available during security assessments.
Although we do not store electronic Protected Health Information (ePHI), we are committed to HIPAA compliance to ensure the protection of health information and provide peace of mind to individuals in health-related fields. We apply HIPAA standards, which include:
Although we do not store electronic Protected Health Information (ePHI), we are committed to HIPAA compliance to ensure the protection of health information and provide peace of mind to individuals in health-related fields. We apply HIPAA standards, which include:
Our security protocols are designed to protect all user data as if it were ePHI.
Our staff undergoes ongoing training in privacy and security best practices to uphold our commitment to data protection.
We prioritize privacy and security in all our operations, ensuring a secure environment for all users, particularly those from health-related fields.
No call transcripts or audio data are stored or retained for any purpose.
All data is encrypted using industry-standard encryption protocols.
Access to sensitive data and critical systems is strictly controlled.
Our systems and processes will be regularly audited to identify and mitigate potential vulnerabilities.
We have a robust plan in place to quickly address and mitigate the effects of security incidents.
No call transcripts or audio data are stored or retained for any purpose.