Security & Compliance

The biometric never leaves the device.

VisitLock was designed by people who've sat across the table from a state Medicaid integrity director. The architecture answers the question they actually ask: where does the biometric live, and what happens if you breach?

A locked phone, padlock, key, and a folded paper labeled BIPA on a walnut desk — the biometric never leaves the device
The unlock signature

Three keys. One token. No biometric in motion.

Every verified visit is signed by the convergence of three independent keys. None of them is the aide's biometric template — that template never leaves the phone.

01

Device Key

A keypair generated in the phone's secure enclave at enrollment. Bound to one device, one aide.

02

Location Key

A signed geofence assertion. Includes anti-spoof, accuracy, and timing metadata.

03

Biometric Match

An on-device match score. The score is signed. The template is not transmitted.

All three signatures must converge. The result is a cryptographic visit token that an auditor can verify five years later — without ever seeing a face.

Compliance posture

What we hold ourselves to.

HIPAA

Business Associate Agreement standard with every customer. Administrative, physical, and technical safeguards mapped to the Privacy and Security Rules.

45 CFR § 164

BIPA-Safe Architecture

Biometric templates are generated and stored on-device, never transmitted to our servers. We don't possess biometric data — so it can't be breached, sold, or subpoenaed from us.

740 ILCS 14 · Texas CUBI · WA HB 1493

21st Century Cures Act EVV

All six required EVV elements captured, plus cryptographic identity binding. Submission directly to state aggregators or via Sandata, HHAeXchange, Tellus, and Therap.

42 U.S.C. § 1396b(l)

SOC 2 Type II

Type I report complete. Type II audit window opened with our auditor of record. Final report expected Q4 2026. Customers under NDA may review the in-progress evidence package.

AICPA TSC 2017

Encryption

AES-256 at rest. TLS 1.3 in transit. Mobile keys generated and held in iOS Secure Enclave or Android StrongBox.

FIPS 140-2 modules

Data Residency

All PHI processed and stored in U.S.-region cloud (AWS us-east-1, us-west-2). Multi-region replication with audited disaster recovery.

RPO 15min · RTO 4hr
For your security review

A trust pack your CISO will actually read.

Architecture diagrams, sub-processor list, penetration test summaries, breach response plan, BAA template, and SOC 2 evidence (under NDA). Sent within 24 hours of request.

Request the Trust Pack