πŸ”’

Your Health Data is Sacred

Privacy isn't a featureβ€”it's the foundation of everything we build. Here's exactly how we protect your information.

How We Protect Your Data

πŸ—‘οΈ

Zero PII Storage

We delete your original lab reports immediately after extracting biomarker data.

  • βœ“Source documents never touch our database
  • βœ“Only numerical biomarker values are stored
  • βœ“No names, addresses, or identifying information
  • βœ“Processing happens in isolated, ephemeral containers
πŸ”

End-to-End Encryption

All data is encrypted in transit and at rest using industry-standard protocols.

  • βœ“TLS 1.3 for all data transmission
  • βœ“AES-256 encryption for data at rest
  • βœ“Encryption keys managed by AWS KMS
  • βœ“Zero-knowledge architecture where possible
πŸ”’

Secure Authentication

We use Google OAuth for authenticationβ€”we never see or store your password.

  • βœ“OAuth 2.0 with Google as identity provider
  • βœ“No passwords stored on our servers
  • βœ“Session tokens with automatic expiration
  • βœ“Multi-device support with secure token management
πŸ›‘οΈ

Infrastructure Security

Built on enterprise-grade infrastructure with multiple layers of protection.

  • βœ“Hosted on AWS with SOC 2 Type II compliance
  • βœ“Automatic security patching and updates
  • βœ“DDoS protection and rate limiting
  • βœ“Regular third-party security audits
πŸ“Š

Data Minimization

We only collect the absolute minimum data required for the service to function.

  • βœ“No tracking cookies or analytics scripts
  • βœ“No third-party advertising integrations
  • βœ“Minimal logging with automatic purging
  • βœ“You can export or delete all data anytime
🌍

Compliance

We adhere to international privacy regulations and industry best practices.

  • βœ“HIPAA-grade security standards
  • βœ“GDPR compliant data handling
  • βœ“CCPA compliant for California residents
  • βœ“Regular compliance audits and certifications

The Journey of Your Lab Report

Transparency is critical. Here's exactly what happens to your data, step by step.

1

Upload

Your PDF is transmitted over TLS 1.3 to an isolated processing container.

Encrypted HTTPS POST request β†’ Ephemeral S3 bucket with 5-minute TTL
2

Process

AI extracts biomarker values, units, and reference ranges from the document.

Serverless function β†’ LLM API call with no data retention β†’ Structured JSON output
3

Delete

The original PDF is permanently deleted. Only extracted data is shown to you for verification.

S3 object deletion β†’ Container destroyed β†’ No trace of source document remains
4

Store

After you confirm, only the numerical biomarker values are saved to your account.

Encrypted PostgreSQL β†’ Row-level security β†’ Only accessible by your user ID

Your Data, Your Rights

πŸ”“ Right to Access

Export your entire health history as JSON or CSV at any time. No waiting, no approval needed.

πŸ—‘οΈ Right to Delete

Delete your account and all associated data instantly from your settings page. Permanent and irreversible.

✏️ Right to Correct

Edit any biomarker value at any time. You own your dataβ€”you control its accuracy.

🚫 Right to Opt-Out

We don't sell your data. We don't share it with third parties. But if we ever did, you'd have full opt-out rights.

Third-Party Services We Use

We're transparent about the services we rely on to deliver Toowit.

Google OAuth (Authentication)

We use Google's authentication service to verify your identity. Google knows you use Toowit, but we never share health data with them.

Google Privacy Policy β†’

Supabase (Database & Auth Infrastructure)

Our database is hosted on Supabase, a SOC 2 Type II compliant platform. All data is encrypted at rest.

Supabase Privacy Policy β†’

AI Provider (Biomarker Extraction)

We use a third-party LLM service to extract biomarker data from PDFs. Your original documents are never stored by us or the LLM providerβ€”only the extracted numerical values are returned.

Note: We configure our LLM provider with strict no-data-retention policies.

Questions or Concerns?

If you have questions about our security practices, discovered a vulnerability, or want to report a privacy concern, please contact us immediately.

Contact Security Team

We respond to security inquiries within 24 hours.