Skip to main content
Data security encompasses the measures and controls that protect your clinical research data from unauthorized access, modification, or loss.

Data Protection Measures

Encryption

TypeImplementation
In TransitTLS 1.2+ for all connections
At RestAES-256 encryption for stored data
DatabaseEncrypted database storage
BackupsEncrypted backup storage

Access Controls

ControlPurpose
AuthenticationVerify user identity
AuthorizationControl resource access
Role-Based AccessPermission by role
Session ManagementSecure session handling

Authentication

Login Security

FeatureDescription
Password RequirementsStrong password policies
SSO SupportGoogle, Microsoft integration
Session TimeoutAutomatic logout after inactivity

Multi-Factor Authentication

When available:
  • Additional verification step
  • SMS or authenticator app
  • Reduces unauthorized access risk

Data Storage

Cloud Infrastructure

Carelane uses enterprise cloud services:
AspectImplementation
ProviderEnterprise-grade cloud
RegionsConfigurable data residency
RedundancyMultiple availability zones
BackupsRegular automated backups

Data Isolation

LevelIsolation
OrganizationSeparate data contexts
StudyStudy-specific access
PHISpecial handling for sensitive data

PHI Handling

Protected Health Information receives special treatment:
MeasurePurpose
Access LoggingTrack all PHI access
MinimizationCollect only needed PHI
EncryptionAdditional encryption for PHI
Access ControlStrict role requirements
Only collect PHI that is necessary for your study. Configure PHI settings thoughtfully.

Data Integrity

Measures to ensure data integrity:
MeasureHow It Works
Audit TrailsComplete change history
Version ControlTrack all modifications
ValidationPrevent invalid data
ChecksumsDetect data corruption

Incident Response

If a security incident occurs:
1

Detect

Automated monitoring detects issues.
2

Contain

Immediate containment actions.
3

Assess

Evaluate scope and impact.
4

Notify

Notify affected parties as required.
5

Remediate

Fix the underlying issue.

Your Role in Data Security

ActionImportance
Strong PasswordsFirst line of defense
Don’t Share CredentialsMaintain accountability
Report ConcernsEarly detection
Follow PoliciesConsistent protection

Best Practices

Use strong, unique passwords. Enable MFA if available.
Only enable PHI fields you actually need.
Protect exported files appropriately.
Report any security concerns immediately.

Access Control

Managing access permissions.

Audit Trails

Activity logging.