HealthCare Logic shares a strong commitment to safeguarding sensitive information and maintaining the trust placed in us by our customers, partners, and stakeholders.

HealthCare Logic’s security practices follows a structured, risk‑based approach to the design, implementation, and ongoing maintenance of controls that support a secure and privacy‑aware operational environment. Our practices are designed to ensure that information assets are protected against unauthorised access, disclosure, alteration, and loss, while supporting regulatory compliance and operational resilience.

It is the objective of HealthCare Logic that all customer interactions demonstrate our respect for information privacy and our commitment to transparent, responsible, and ethical data handling practices. Security and privacy considerations are embedded into our people, processes, and technology, ensuring that the protection of customer data remains a foundational principle across our operations.


Security Governance & Assurance

Do you have an Information Security Management System (ISMS)?

Yes. HealthCare Logic operates a formal ISMS with documented policies and procedures covering (not limited to) information security governance, risk management, incident management, access control, secure development, vendor management, logging/monitoring and business continuity.

Are you certified to ISO 27001?

HealthCare Logic has received ISO 27001:2022 certification and maintains an information security program aligned to ISO 27001.

Do you have an Information Security Policy that covers Confidentiality, Integrity, and Availability

Yes. HealthCare Logic’s Information Security Policy explicitly commits to protecting information from unauthorised access and maintaining confidentiality, integrity, and availability, along with required security training and breach reporting/investigation.

How often are security policies reviewed and communicated?

HealthCare Logic follows internal governance for internal audits and management review cycles. All staff are required to acknowledge that they have read and understood security policies and procedures as part of ongoing compliance.

Do you perform security audits and penetration testing?

Yes. HealthCare Logic carries out internal security auditing and reviews, along with penetration and security testing performed at minimum, on an annual basis.

People Security and Training

Do employees and contractors receive security awareness training?

Yes. All employees and contractors perform mandatory security awareness training annually, with training records maintained. There is also a mandatory induction and annual refreshers covering common security topics (clean desk/screen, BYOD, phishing, malware, etc).

Do you conduct background checks / screening before employment?

Yes. HealthCare Logic conducts pre‑employment screening which includes:

  1. Identity confirmation
  2. Reference checks
  3. Qualification verification
  4. Right‑to‑work checks, and
  5. Criminal record checks where required and/or applicable.

Are staff bound by confidentiality and security obligations?

Yes. HealthCare Logic employment/engagement terms mandate compliance with information security policies, confidentiality obligations during and after employment, and disciplinary consequences for breaches.

Identity & Access Management (IAM)

How do you control access to systems (least privilege / need‑to‑know)?

HealthCare Logic's Access Control Policy requires access to be authorised based on job role and business need, applying least privilege, avoiding generic accounts, associating accounts with an owner, and reviewing access rights regularly.

How are access requests approved and revoked (joiner/mover/leaver)?

The Access Control Policy covers the full access lifecycle (grant/modify/revoke), including approval by appropriate authorities and removal/disablement when a user changes roles or leaves.

Do you enforce segregation of duties for privileged access?

Yes. The Access Control Policy includes privileged access controls, ownership requirements for privileged accounts, and stronger password requirements for privileged access.

Do you support MFA / strong authentication?

Yes. MFA is employed for accounts, along with phishing resistant controls, conditional access policies and risk-based access prevention.

Encryption, Key Management & Data Protection

Is data encrypted in transit?

Yes. HealthCare Logic requires the use of modern, accepted protocols and encryption practices for sensitive data transmission.

Is data encrypted at rest?

Yes. Data stored in databases, software systems, endpoints and servers are encrypted at rest, following HealthCare Logic Key Management & Cryptography Policy for best practices

How are cryptographic keys managed?

HealthCare Logic's Key Management & Cryptography Policy describes secure storage and handling of keys (including use of secure containers and RBAC controls).

Logging, Monitoring & Auditability

Do you maintain audit logs?

Yes. HealthCare Logic's Logging & Monitoring policy requires logging and monitoring of access and security events, with secure log retention and review processes.

Are logs protected and reviewed?

Yes, logs are to be kept secure, retained, and reviewed on a routine basis.

Secure operations

How do you manage vulnerabilities and patching?

HealthCare Logic ISMS includes network security and change management expectations for timely patching and responding to discovered flaws, plus vulnerability and penetration testing management processes.

Do you use endpoint protection and device encryption?

Yes. HealthCare Logic include maintaining endpoint protection and device encryption coverage for company devices, including encryption and security controls for BYOD.

How do you manage changes to systems?

The ISMS Change Management Policy requires documented change requests, approval before production changes, communication of planned changes, rollback preparedness, and post‑change review.

Is there a formal change and release process for SystemView?

Yes. HealthCare Logic follows a SystemView-specific Release Process and Testing SOP. All changes to SystemView go through this structured process. We operate under a Shared Responsibility Model, which allows release workflows to be integrated into each customer’s environment with stakeholder engagement. As every customer has unique governance and CAB processes, HealthCare Logic works closely with customers to ensure alignment with their change management requirements.

Are dev/test/prod environments separated?

Yes. We follow segregation principles as part of secure engineering and network practices to ensure environments are separated.

Backup, disaster recovery & continuity

Do you back up systems and test restores?

Yes. HealthCare Logic holds and practices the Backup and Restoration Policy, which includes periodic backups, off‑location storage, documentation, and periodic review/testing of backup recoverability.

Do you have Business Continuity and Disaster Recovery (BC/DR)?

Yes. HealthCare Logic has a formal BC/DR Policy with plans tested and reviewed at regular intervals

In customer‑hosted deployments, who is responsible for infrastructure DR?

For customer‑hosted deployments, certain controls (e.g., data centre physical security, infrastructure malware protection, infrastructure patching) remain the customer’s responsibility, while HealthCare Logic applies standard controls to HCL‑managed environments and application-layer processes.

Incident response & breach handling

Do you have an incident response process?

Yes. HealthCare Logic has a formal Incident and Improvement Management Policy, which includes identification, recording, corrective actions, and review of incidents, including use of a central register and a Cyber Security Incident Response Plan.

Do you notify affected parties if required?

Yes. HealthCare Logic includes procedures to notify affected individuals and regulators in accordance with local laws. HealthCare Logic will notify customers per contract and applicable law.

Third parties, sub-processors & supply chain

Do you have a vendor / third‑party risk management program?

Yes. HealthCare Logic includes a Vendor Management Policy. This outlines evaluating providers, requiring security controls, contractual obligations, and periodically re‑evaluating suppliers. Third parties are also held to required security obligations, which can include overlap with customer governance for supply chain requirements.

Do you sell personal information?

No.

Privacy, patient data, and hospital-specific expectations

Who controls patient data - HealthCare Logic or the hospital?

The Health organisation controls the use of patient personal information. HealthCare Logic processes patient data in accordance with the health organisation’s instructions.

Do you use patient data for marketing?

No.

Do you transfer patient data outside the hospital/health organisation?

Our privacy policy explains data handling and the types of information that may be collected and used, which can vary by region and deployment.

What personal information do you collect via the website (prospects/clients/partners)?

Information collected via our website includes form submission data such as name, email, role and contact phone numbers.

How can someone access or correct their personal information?

Individuals may request access and correction of personal information by contacting HealthCare Logic privacy@healthcarelogic.com. HealthCare Logic may require identification before releasing requested information.

Do you have a privacy complaints process?

Yes. The Privacy Policy outlines complaint handling, including acknowledging complaints within a short timeframe and aiming to resolve within 30 days, and includes escalation to the OAIC if needed.

Data retention & secure disposal

How long do you retain customer/personal data?

Data retention follows our Privacy Policy, data retention principles, and contractual agreements.

  1. Personal and customer data is retained only for as long as necessary to fulfill its intended purpose and comply with legal obligations.
  2. Customer data is maintained while the customer is active and then retained according to the terms of the contract.

How do you delete or dispose of customer data?

HealthCare Logic follows a structured customer data disposal process, including formal deletion requests, verification, secure/permanent deletion, documentation, and vendor disposal requests when third parties are involved.

How do you dispose of hardware and media securely?

Asset management and technology equipment handling/disposal policies covering sanitisation/wiping, disposal, and records of disposal actions.