Welcome to the Kyla Security Portal! This portal provides an overview of our commitment to security and compliance. You can find our certifications, security practices, and explore details on our controls.

security@kyla.com
Privacy Policy
What measures are in place to protect my personal and health information?
We utilize advanced data encryption techniques to safeguard your personal and health information both at rest and during transmission. Our comprehensive cybersecurity framework ensures your data is protected against unauthorized access and breaches.
Confidentiality is our top priority. We adhere to strict data classification policies and access controls to ensure that only authorized personnel have access to patient data. All staff undergo rigorous security training to handle patient information securely.
In the unlikely event of a security breach, we have a robust incident response plan in place. This includes immediate measures to secure data, a thorough investigation to determine the breach's cause, and communication with all affected parties according to regulatory requirements.
Patients can securely access their medical records through our encrypted patient portal. The portal is protected with multi-factor authentication to ensure that only you can access your personal health information.
Our infrastructure and applications benefit from a comprehensive security strategy that includes continuous monitoring, regular vulnerability scans, and timely remediation processes. Beyond employing advanced firewall and anti-malware solutions to fend off threats, we commit to the Secure Software Development Life Cycle (SSDLC) and seamlessly incorporate security measures into our DevSecOps pipeline. Such integration guarantees that security scanning is an integral part of our development process, enabling us to detect and fix vulnerabilities before deployment. This meticulous approach helps safeguard the integrity and security of our systems throughout the development lifecycle.
We ensure the security of our applications by adhering to a rigorous development lifecycle, where security is embedded from the initial design phase through to deployment. Our strategy encompasses regular security assessments and rigorous testing protocols to meet and exceed the highest industry security standards. By embracing these practices, we deliver secure applications designed to protect against evolving cyber threats and vulnerabilities, ensuring a trusted and safe digital environment for all users.
Patient data is only shared with third parties when necessary for your treatment, and with your consent, or as required by law. All third parties are thoroughly vetted, and bound by strict confidentiality and data protection agreements.
Ensuring compliance with ISO2001 and other pertinent healthcare regulations forms the core of our operational ethos at Kyla. We engage in comprehensive regular audits and conduct thorough risk assessments to rigorously scrutinize our practices against regulatory standards. Furthermore, we continuously update our policies and enhance our training programs to adapt to the evolving regulatory landscape. This proactive approach enables us to maintain steadfast compliance, safeguard patient privacy, and foster a culture of trust and security within all aspects of our services.
We have formal retention and disposal procedures in place to guide the secure deletion of patient data. This ensures that when data is no longer needed, it is disposed of in a manner that prevents any possibility of unauthorized access or recovery.
Your concerns are important to us. If you have any questions or concerns about your privacy or data security, please contact us at security{@}kyla.com. We provide several channels for reporting, including an anonymous hotline, to ensure you can report issues comfortably and confidentially.