Skinobs guarantees a high level of confidentiality for data passing through the platform's messaging system. End-to-end encryption ensures that data remains between the two parties (user and service provider).
The messaging service is powered by CometChat, a company specialising in instant messaging with many customers who handle sensitive data (particularly medical data), and which has numerous security certifications: the company carries out reviews at least once a year to ensure compliance with HIPAA, PIPEDA, the RGPD and the CCPA.
Data encryption technologies
AES 256 encryption of data at rest
Advanced Encryption Standard (AES) is a symmetric block cipher selected by the US government to protect classified data. AES-256 encryption uses a 256-bit key to encrypt and decrypt a block of messages. It includes 14 rounds of 256-bit keys, each round comprising processing steps that involve substituting, transposing and mixing plaintext to transform it into ciphertext.
SSL/TLS encryption of data in transit
This is a communication protocol or rule that enables computer systems to communicate with each other over the Internet in complete security. SSL/TLS certificates enable web browsers to identify and establish encrypted network connections to websites using the Secure Sockets Layer/Transport Layer Security (SSL/TLS) protocol.
Data security certifications
HIPAA certification
HIPAA is a set of US federal regulatory standards that describe the lawful use and disclosure of protected health information in the United States.
HIPAA compliance is regulated by the Department of Health and Human Services (HHS) and enforced by the Office for Civil Rights (OCR).
HIPAA compliance is a living culture that healthcare organisations must implement in their operations to protect the privacy, security and integrity of protected health information.
SOC 2 certification
Formal set of reports produced following an audit. The audit is carried out by a CPA or an accountancy firm.
ISO 27001 certification
ISO 27001 certification demonstrates the implementation of an effective information security management system (ISMS) based on the international reference standard ISO 27001. It defines a methodology for identifying cyber threats, controlling the risks associated with the organisation's critical information, and putting in place appropriate protection measures to ensure the confidentiality, availability and integrity of information.