Enterprise-Grade Security

Your Patient Data Never
Touches Our Servers

No PHI storage. No credit card handling. No compliance nightmares keeping you up at 2 AM. We automate your reminders and follow-ups — your sensitive data stays exactly where it belongs: in your systems.

Zero HIPAA burden • Zero PCI scope • Zero liability transfer

Talk to Security Team
TLS 1.3 Encryption
SOC 2 Aligned
Ungated Docs (No Email)

Need to loop in IT or compliance? The Security Overview PDF answers procurement questions in plain English — no hoops, just answers.

Data Philosophy

Your data never leaves your building.
We just knock on the door.

When a breach hits the news, someone's holding patient data they shouldn't have. That's never us. Your client records — names, phone numbers, appointment history — stay locked in your EHR, your CRM, your systems. We connect via secure API, grab what we need for that one reminder, and let go.

No second database. No copies sitting on a server in some data center. We're a real-time relay — which means if the worst happens, there's nothing on our side to steal.

Zero HIPAA scope. Zero PCI-DSS scope.

We intentionally avoid touching Protected Health Information or payment card data. Your compliance officer can sleep — there's nothing to audit on our end.

What We Do
  • Automate reminders, follow-ups & scheduling workflows
  • Connect via OAuth 2.0 + TLS 1.3 encryption in transit
  • Provide full audit trails and operational logs
What We Don't
  • Store PHI, medical records, or diagnosis data
  • Handle credit cards or payment information
  • Gate compliance docs behind email capture

This page is built to forward. Clear boundaries, clear architecture, instant documentation.

Radical Transparency

Exactly what we see — and what we don't.

This is the screenshot your IT team forwards to legal. Plain-English boundaries, zero hand-waving.

4
Fields Accessed Minimum needed for automation
5
Categories Blocked PHI, payments, and more
Data Type Access Why / Why Not
First name, last name
Yes
Personalize messages so they don't read like a robot wrote them.
Phone number
Yes
Send SMS reminders and follow-ups. TCPA consent rules apply.
Appointment date/time
Yes
Trigger confirmations, reminders, and reschedule workflows.
Service booked
Yes
Make messages context-aware: what, where, when.
Medical records
No
Stays in your PMS/EHR. Not required for reminders.
Treatment notes
No
We don't automate clinical decisions. Not needed.
Payment card numbers
No
Stays with your payment processor. Zero PCI scope.
Social Security numbers
No
Never requested. Never transmitted. Never stored.
Insurance details
No
Not part of scheduling or reminder workflows.

The 4 fields we do access are encrypted in transit (TLS 1.3) and never stored. Data flows through in real time, powers your automation, and returns to your system.

TLS 1.3 Encryption OAuth 2.0 Access Ungated Documentation
system_architecture.md

Data passes through.
Nothing is stored.

Real-time API processing with zero persistence layer. Your systems stay the source of truth — we're just the messenger.

OAuth 2.0

Scoped access tokens with automatic expiry. We request only the permissions needed — revoke anytime from your dashboard.

TLS 1.3

Latest encryption standard with forward secrecy. All data encrypted in transit — nothing readable if intercepted.

REST API

Stateless request/response architecture. Each call is independent — no session data, no server-side storage.

Secure Connection

OAuth 2.0 scoped tokens with automatic expiry. Your credentials never exposed to front-end systems or third parties.

Tokens expire in 1 hour

No Storage Layer

Process in memory, discard on completion. No shadow databases, no data lakes, no backup copies sitting on a server.

Zero data retention

Instant Revocation

Revoke API access anytime from your admin panel. Connection severed immediately — no waiting, no ticket, no call.

< 60 second disconnect

Plain English: We automate the communication layer. We don't become your system of record.

4 Active Frameworks
Last audited: October 2025
Zero breaches since launch
Live Compliance Status

$50K fines happen.
Not on our watch.

One misrouted text message. One unsecured voicemail. That's all it takes for a TCPA violation . We handle the communication compliance so you never get that letter.

Active Compliance Frameworks

4 Frameworks Maintained
SOC 2 Type II Certification
65%
Documentation & controls audit phase Est. Q2 2026

Why "In Progress" is honest: Other vendors claim certifications they don't have. We show you real-time status because enterprise buyers verify—and we pass.

Compliance Burdens We Eliminate

Zero Inherited Liability

What This Actually Saves You

HIPAA and PCI audits aren't cheap. Annual penetration testing, staff training, policy documentation, vendor assessments—it compounds. By staying out of scope, you skip:

40+ Hours/year in audits
$15K+ Annual compliance costs
0 BAAs to negotiate
Typical AI vendor: "Sign this 40-page BAA" Us: "Not needed—here's why"
Procurement FAQ

The 6 questions that kill vendor deals.

Every vendor review dies in the same place: data, access, breach response. Here's exactly what your compliance team needs to hear—formatted for copy-paste into questionnaires.

Questions reviewed:
0/6

Short answer: None. We process scheduling data in real-time via API and immediately discard it. No patient names, phone numbers, or appointment details persist on our servers after the transaction completes.

Zero persistent patient data = zero breach exposure

We maintain action audit logs (timestamps of "SMS sent", "call initiated") for 90 days per our retention policy. These logs contain no PHI, no message content, no patient identifiers—only action metadata required for debugging and compliance reporting.

Data flow: Your PMS → API request → Real-time processing → Response → Immediate discard. No intermediate storage.

See DPA
Helpful?

TLS 1.3 everywhere, no exceptions. All API connections enforce modern encryption. We reject downgrade attempts to older TLS versions. OAuth 2.0 tokens authenticate every request—no API keys in URLs.

A+ rating on SSL Labs security scan

Cipher suites: TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256. Certificate pinning available for enterprise deployments. HSTS enforced with 1-year max-age.

Authentication: OAuth 2.0 with short-lived tokens (1hr expiry), refresh token rotation, and scope-based permissions per integration endpoint.

Security overview
Helpful?

Three vendors, all SOC 2 certified: Twilio (SMS/Voice), OpenAI (language processing), AWS (hosting). That's the complete list. No shadow vendors, no offshore processing, no surprises in your security review.

30-day advance notice on subprocessor changes

Twilio: SMS/voice delivery only. No message storage beyond delivery confirmation. HIPAA-eligible tier not required (we send no PHI).

OpenAI: GPT-4o-mini for intent classification. Zero data retention agreement in place. Prompts contain no patient identifiers.

AWS: us-east-1 region. VPC-isolated. No data leaves US infrastructure.

Full list
Helpful?

No browsing, no exports, no access. Our engineers cannot query your patient database. API credentials are scoped to specific actions (read appointment slots, trigger SMS)—never bulk data access. You can revoke our access in under 60 seconds.

Principle of least privilege enforced

Scoped permissions per integration: appointments.read, availability.read, notifications.send. No patients.list, no records.export, no admin access to your PMS.

Access revocation: Update OAuth credentials in your PMS, our access terminates immediately. No "pending disconnect" period.

Access policy
Helpful?

Nothing to exfiltrate. Since we don't store patient data, a breach of our systems yields no PHI, no patient records, no contact lists. The realistic risk is service disruption—we maintain automated failover and commit to 24-hour notification of any security incident.

24-hour breach notification SLA in DPA

Incident response: Automated alerting → On-call engineer (15min SLA) → Containment → Client notification → Post-mortem within 7 days.

Breach scope reality: Attackers gain access to action logs (timestamps only), API credentials (rotated immediately), infrastructure config. No patient data exists to steal.

IR plan
Helpful?

Simple: there's nothing to delete. Since we don't store patient data, deletion requests have nothing to act on. We'll confirm "no persistent records exist" in writing and coordinate with your system of record for any audit log questions.

72-hour response to data subject requests

Request workflow: You receive DSR → Forward to us → We confirm no data stored → Provide written confirmation within 72 hours → You complete response to data subject.

Audit logs: Action timestamps retained 90 days, then automatically purged. These contain no PII and are not subject to DSR requirements.

Privacy policy
Helpful?

Skip the 3-week legal review.

Download our DPA + Security Overview—pre-formatted for procurement. Or book 15 minutes with our team to answer the questions your questionnaire didn't cover.

Security Documentation

Forward-ready docs.
No email gate.

Deal stuck on legal/IT? Grab the PDFs and keep momentum. Zero forms, zero spam, zero waiting.

3 Documents
Ungated Access
Updated Monthly

Security & Privacy Overview

Technical summary of our architecture, encryption standards, access controls, and operational safeguards.

PDF 4 pages 280 KB Dec 2025

Why We Don't Need HIPAA

One-page explainer: API-only architecture + no PHI storage = no HIPAA scope for your compliance team.

PDF 1 page 95 KB Dec 2025
Security Team Available Now

Ready to pass procurement?

Stop chasing vendors for security docs. Walk into your next review with every answer ready—or skip the meeting entirely with our self-serve pack.

GDPR Compliant
TCPA Compliant
SOC 2 In Progress
Pre-filled vendor questionnaire
DPA + Security Overview PDF
Subprocessor list with DPAs
Talk to a human Schedule Security Review
15-20 min calls only
Zero sales pitch
NDA available on request

40+ practices passed vendor review on first submission with our docs.

Built for real-world chaos: after-hours, emergencies, “we need it done today.”
Aligned to Shockwave’s 4-tier model — start lean, scale to governance.
Response AI $3–4K/mo Revenue AI $6–7K/mo Shockwave OS $9–12K/mo Network Intelligence $15K+/mo

Get Started

Stop feeding your competitors missed calls

Shockwave answers, qualifies, and routes leads while you’re busy doing the actual work.

  • HVAC: no-heat call at 2:17 AM—captured, qualified, booked before they tap the next listing.
  • Dental: “Do you take my insurance?”—answered instantly, eligibility captured, consult requested.
  • Plumbing: burst pipe—address + urgency confirmed, dispatch pinged, job details logged clean.
  • Small Law (DUI/PI): intake starts immediately—incident details captured, urgency assessed, consult scheduled.
  • Med Spa: “How much is lip filler?”—price band + availability shared, deposit link sent, slot held.
  • Pest Control: same-day request—service area verified, quote range provided, booking completed.
Limited Q1 build slots

Most owners start with Response AI, then upgrade to Revenue AI once routing + reporting prove ROI. See tiers.

Book Strategy Call