Refocused | refocused.ai
Background image of a camera

Enterprise Security

Robust security and compliance features designed for enterprise requirements.

SOC

Our systems and processes are in the process of becoming SOC certified, ensuring robust controls for security, availability, processing integrity, confidentiality, and privacy.

HIPAA

For healthcare organizations, our HIPAA-compliant solutions ensure Protected Health Information (PHI) is handled with appropriate safeguards.

GDPR

Our solutions are designed with privacy by design principles to comply with the EU's General Data Protection Regulation.

Enterprise-Grade Security

We understand that enterprise customers have stringent security requirements, especially when handling sensitive or proprietary videos. Our platform is built from the ground up with security as a core principle.

End-to-End Encryption

All data in transit and at rest is protected with industry-standard encryption protocols.

Role-Based Access Control

Granular permission systems ensure only authorized personnel can access sensitive data or operations.

Secure Infrastructure

Our systems are hosted in SOC compliant data centers with robust physical security measures.

Regular Security Audits

Independent security assessments and penetration testing verify our security controls.

Data Isolation

Enterprise customer data is logically isolated to prevent cross-contamination.

Access Logging & Monitoring

Comprehensive logging and real-time monitoring detect and alert on suspicious activities.

Data Privacy By Design

Our commitment to data privacy goes beyond compliance checkboxes. We've built our systems with privacy-preserving principles at their core:

  • Data minimization - we only collect what's necessary
  • Automated data retention policies to ensure data isn't kept longer than needed
  • Transparent data processing practices documented in our privacy policy
  • Data processing agreements available for enterprise customers
  • Privacy impact assessments conducted for major system changes
  • Regular employee training on data protection and privacy

Certifications & Compliance

We maintain a comprehensive compliance program and can provide the following documentation to enterprise customers:

  • Security whitepapers and architecture documentation
  • Data Processing Agreements (DPAs)
  • Penetration testing summary reports
  • Custom compliance documentation for specific regulatory needs

Enterprise Security FAQ

How is my organization's data protected?

All data is encrypted both in transit (using TLS 1.3) and at rest (using AES-256). For on-premise deployments, data never leaves your infrastructure. For cloud deployments, we use logical data isolation to ensure your data is separated from other customers.

Do you retain my videos after processing?

By default, we apply data retention policies that purge videos 30 days after processing. Enterprise customers can configure custom retention periods, including immediate deletion after processing is complete.

Can you meet specific compliance requirements for my industry?

We work with customers across regulated industries and can adapt our security controls to meet specific requirements. Our compliance team can work with yours to ensure all necessary safeguards are in place.

How do you handle security incidents?

We maintain a comprehensive incident response plan with defined procedures for identifying, containing, eradicating, and recovering from security events. Enterprise customers receive notification of relevant security incidents according to the terms of our service agreement.

Ready to learn more about our security measures?

Our security team is available to discuss your specific requirements and provide detailed documentation.