Skip to main content
All CollectionsSearch platformSecurity & Accessibility
Encryption and privacy of email data
Encryption and privacy of email data

Find out more about end-to-end email encryption and related security certifications.

Updated over a month ago

Skinobs guarantees a high level of confidentiality for data passing through the platform's messaging system. End-to-end encryption ensures that data remains between the two parties (user and service provider).

The messaging service is powered by CometChat, a company specialising in instant messaging with many customers who handle sensitive data (particularly medical data), and which has numerous security certifications: the company carries out reviews at least once a year to ensure compliance with HIPAA, PIPEDA, the RGPD and the CCPA.

Data encryption technologies

AES 256 encryption of data at rest

Advanced Encryption Standard (AES) is a symmetric block cipher selected by the US government to protect classified data. AES-256 encryption uses a 256-bit key to encrypt and decrypt a block of messages. It includes 14 rounds of 256-bit keys, each round comprising processing steps that involve substituting, transposing and mixing plaintext to transform it into ciphertext.

SSL/TLS encryption of data in transit

This is a communication protocol or rule that enables computer systems to communicate with each other over the Internet in complete security. SSL/TLS certificates enable web browsers to identify and establish encrypted network connections to websites using the Secure Sockets Layer/Transport Layer Security (SSL/TLS) protocol.

Data security certifications

HIPAA certification

HIPAA is a set of US federal regulatory standards that describe the lawful use and disclosure of protected health information in the United States.

HIPAA compliance is regulated by the Department of Health and Human Services (HHS) and enforced by the Office for Civil Rights (OCR).

HIPAA compliance is a living culture that healthcare organisations must implement in their operations to protect the privacy, security and integrity of protected health information.

SOC 2 certification

Formal set of reports produced following an audit. The audit is carried out by a CPA or an accountancy firm.

ISO 27001 certification

ISO 27001 certification demonstrates the implementation of an effective information security management system (ISMS) based on the international reference standard ISO 27001. It defines a methodology for identifying cyber threats, controlling the risks associated with the organisation's critical information, and putting in place appropriate protection measures to ensure the confidentiality, availability and integrity of information.

Did this answer your question?