Security

Security Practices, Policies and Infrastructure

Medical Dictation Security: HIPAA-Compliant, AES-256 Encrypted, BAA-Backed

VoiceboxMD is a HIPAA-compliant, cloud-native medical dictation platform that protects every patient utterance with AES-256 encryption at rest, TLS 1.3 in transit, US-only data residency, multi-factor authentication, and a signed Business Associate Agreement with every customer.

Last updated April 2026. Reviewed by the VoiceboxMD Security and Compliance Team.

πŸ”’
AES-256
Encryption at rest
🌐
TLS 1.3
Encryption in transit
πŸ‡ΊπŸ‡Έ
US Residency
Data never leaves the US
πŸ“
BAA Included
Every paid plan
βœ…
HIPAA Aligned
45 CFR 164
πŸ›‘οΈ
Pen-Tested
Annual third-party

Security Is the Product

Clinical documentation is only useful if it is unimpeachably private. The moment a patient begins to speak, every word of that conversation becomes Protected Health Information under HIPAA, and the obligation to protect it transfers, instantly, to the platform listening on the other end of the microphone.

VoiceboxMD was built around that obligation. Speech recognition is what the product does; security is what makes the product trustworthy enough to use. Every utterance processed by our engine is encrypted before it leaves the device, decrypted only inside isolated processing memory, and re-secured before persistent storage. Audio recordings are not retained beyond the active session. Transcripts and account data are accessible only through the credentials of the clinician who authored them. There is no shared inbox, no bulk export, no data lake of patient voice. Confidential information stays confidential by default, by configuration, and by cryptography.

How VoiceboxMD Protects Your Data: The Encryption Pipeline

STAGE 1

Capture

Audio is captured locally on Mac, Windows, iPhone, or iPad. The client establishes a mutually authenticated TLS 1.3 channel before a single byte of voice is transmitted, using AEAD cipher suites such as TLS_AES_256_GCM_SHA384 with perfect forward secrecy.

STAGE 2

Transit

Voice frames travel from the device to our US-region cloud inside the TLS 1.3 envelope. The recognition engine never operates over plaintext. Authentication tags on every frame guarantee the audio cannot be silently tampered with in flight.

STAGE 3

Recognition

Speech-to-text inference happens in segregated memory inside our US data center. Audio is decrypted only for the milliseconds required to be transcribed, then evicted. Audio is not retained beyond the active session by default; only transcribed text persists for your review.

STAGE 4

Storage and Retrieval

Persistent transcripts, profiles, and account data are encrypted at rest with AES-256 in Galois/Counter Mode. No engineer holds plaintext keys; rotation is automated.

HIPAA Compliance and Your Business Associate Agreement

Under HIPAA, any vendor that creates, receives, maintains, or transmits PHI on behalf of a covered entity is a Business Associate, and a signed BAA is required by 45 CFR 164.504(e). VoiceboxMD signs a Business Associate Agreement with every customer who handles PHI, on every paid plan, at no extra cost.

The VoiceboxMD BAA establishes our binding obligations to:

  • Use and disclose PHI only as permitted by the agreement and the HIPAA Privacy and Security Rules.
  • Implement administrative, physical, and technical safeguards consistent with 45 CFR 164.308, 164.310, and 164.312.
  • Report any security incident or breach of unsecured PHI without unreasonable delay.
  • Pass equivalent obligations to subcontractors that touch PHI.
  • Return or destroy PHI at the end of the relationship.

Our compliance program is mapped to the standards published by the U.S. Department of Health and Human Services (HHS) Office for Civil Rights and to NIST Special Publication 800-66 Revision 2 (Implementing the HIPAA Security Rule: A Cybersecurity Resource Guide, finalized February 14, 2024), the current authoritative federal guidance for HIPAA-regulated entities. Where the proposed January 2025 HIPAA Security Rule modifications anticipate new mandatory controls, including universal encryption of ePHI, enforced multi-factor authentication, biannual vulnerability scans, and annual penetration testing, VoiceboxMD already operates at or above that bar.

To request a copy of the current BAA, email support@voiceboxmd.com

Encryption Standards in Plain English

Encryption is only as strong as the algorithms, key sizes, and protocol versions behind it. VoiceboxMD publishes its choices openly so reviewers can verify them line by line.

Data at rest

AES-256 in GCM mode (AES-256-GCM), implemented inside FIPS 140-2 validated cryptographic modules. AES-256 is the symmetric cipher recommended by NIST for protecting Top Secret information; GCM provides authenticated encryption.

Data in transit

TLS 1.3 (RFC 8446) with AEAD cipher suites and perfect forward secrecy. Older protocols including SSL 3.0, TLS 1.0, and TLS 1.1 are disabled at the load balancer.

Authentication

Multi-factor authentication is enforced for administrative access and available for all clinical users. Passwords are stored as salted, memory-hard hashes. Session tokens are short-lived and rotated on privilege change.

Key management

Encryption keys live in a managed Hardware Security Module-backed service. Keys are rotated on a documented schedule, can be revoked immediately on suspected compromise, and are never exported in plaintext.

The combination, AES-256-GCM at rest, TLS 1.3 in transit, MFA on access, FIPS-validated modules, automated key rotation, is the same posture expected by the HHS-proposed HIPAA Security Rule revision and by HITRUST CSF v11.7 (December 2025).

Zero-Knowledge, Least-Privilege Architecture

VoiceboxMD is built on a zero-knowledge, least-privilege model: the platform does the cryptographic work required to recognize speech and store transcripts, but no human at VoiceboxMD has standing access to the contents of any customer’s clinical notes.

In practical terms:

  • No standing employee access. Engineers cannot read clinical transcripts as part of normal operations. Production data is segregated from development and staging environments.
  • Break-glass procedure only. Any access to a customer’s data, for example to investigate a support ticket the customer has explicitly filed, requires customer authorization, time-bounded credentials, dual-control approval, and an immutable audit log entry.
  • Account-level isolation. Each customer’s transcripts are bound to that customer’s encryption context. There is no cross-tenant query path.
  • Device-bound access. Every utterance is, by design, accessible only to the authenticated user and the device they used to capture it. Login credentials are the gatekeeper, and credentials are protected by MFA and rate-limiting.

The architecture borrows the rigor of zero-trust networking, never trust, always verify, and applies it inside the application layer, not just at the perimeter.

United States Data Residency

All VoiceboxMD production data, voice frames during processing, transcripts at rest, profiles, account metadata, backups, and any system logs that may incidentally contain PHI, is stored and processed exclusively within data centers located in the continental United States.

US data residency matters for three reasons:

  1. HIPAA jurisdictional clarity. PHI never crosses an international border, simplifying breach notification and enforcement under HHS and OCR jurisdiction.
  2. State-law alignment. Many state medical record retention and privacy laws presume in-country processing.
  3. Procurement defensibility. US-only residency is a hard procurement requirement for many hospital systems, federal facilities, VA-affiliated practices, and academic medical centers. VoiceboxMD satisfies it without an enterprise upcharge.

Our underlying infrastructure providers are themselves SOC 1, SOC 2 Type II, ISO 27001, FedRAMP, and HITRUST-attested, layering an additional independently audited control envelope around our application.

Penetration Testing, Vulnerability Management, and Independent Audits

Security claims are only credible when they are tested by people whose job is to break them. VoiceboxMD’s external assurance program includes:

  • Annual third-party penetration testing of the web application, API, mobile clients, and supporting infrastructure, conducted by an independent credentialed firm. Critical findings are remediated on a documented SLA; reports are available under NDA to qualified prospects.
  • Continuous automated vulnerability scanning of production hosts, container images, and dependencies, exceeding the biannual cadence anticipated by the proposed 2025 HIPAA Security Rule update.
  • Static and dynamic application security testing (SAST/DAST) integrated into our CI/CD pipeline, so security regressions are blocked before they reach production.
  • Responsible disclosure channel for independent researchers (see Vulnerability Reporting below).
  • SOC 2 Type II-aligned controls across security, availability, and confidentiality criteria.

Access Controls, Authentication, and Audit Logging

Access to PHI is governed by the principle of least privilege. Every user, every API key, and every internal service is granted the minimum permission required to perform its function, no more.

For clinicians and staff users: strong password policy with breached-password screening; multi-factor authentication available for all clinical users and required for administrators; role-based access control so practice administrators can scope which users see which patients, templates, and macros; automatic session expiration; Single Sign-On (SAML 2.0 / OIDC) on enterprise plans.

For VoiceboxMD personnel: just-in-time privileged access with no permanent production credentials; mandatory MFA on all internal systems; quarterly access reviews; immediate deprovisioning on role change or termination.

Audit logging. Every authentication event, every PHI access, every administrative action, and every security-relevant system event is logged to an append-only, tamper-evident audit trail. Logs are retained for at least six years, consistent with the HIPAA documentation retention requirement at 45 CFR 164.316(b)(2). Around-the-clock security monitoring detects anomalous patterns, credential stuffing, unusual export volumes, geographically improbable logins, and triggers automated containment with human escalation.

Infrastructure Hardening and Incident Response

VoiceboxMD runs on a cloud-native, segmented, defense-in-depth infrastructure inside US-region cloud environments. Network segmentation isolates the public web tier, the application tier, and the data tier. A Web Application Firewall and DDoS mitigation sit in front of every public endpoint. Container images and host operating systems are hardened and automatically patched. Production data stores have no direct internet access. Production hosts are immutable, rebuilt from known-good images rather than patched in place. Encrypted backups are stored in a separate availability zone and key context, and their recoverability is tested on a documented schedule.

VoiceboxMD maintains a documented Incident Response Plan tested at least annually. Our targeted timeline aligns with the 72-hour restoration objective contemplated by the proposed HIPAA Security Rule update. In the unlikely event of a confirmed breach of unsecured PHI, VoiceboxMD will (1) contain and eradicate the threat while preserving forensic evidence, (2) notify affected covered-entity customers without unreasonable delay and within the timelines required by 45 CFR 164.410, (3) provide affected customers with the information they need to satisfy their own breach-notification obligations to patients and HHS, and (4) conduct a documented post-incident review and remediation.

Data Lifecycle: Retention, Portability, and Deletion

The clinician’s content belongs to the clinician.

  • Retention. Transcripts and profiles are retained for as long as the account is active. Audio recordings are not retained by default beyond the active dictation session.
  • Portability. Clinicians can export transcripts on demand to PDF or plain text, or copy directly into any EHR text field.
  • Deletion. On account closure or written request, customer PHI is deleted from production within thirty days and from backups within their normal rotation. A certificate of destruction is available on request.
  • No model training on PHI. Customer PHI is never used to train general-purpose AI models. Engine improvements are derived from de-identified, aggregate signals only.

Operational Practices: Workforce, Subprocessors, and Business Continuity

Workforce security. Background checks (criminal, employment, education) on all employees and long-term contractors prior to access provisioning. Mandatory HIPAA Privacy and Security Rule training at onboarding and annually thereafter. Phishing simulation and security-awareness exercises throughout the year. Confidentiality and acceptable-use agreements signed before any access to systems. Documented offboarding that includes same-day credential revocation.

Subprocessor management. VoiceboxMD operates a documented Vendor Risk Management program. Every subprocessor that may touch PHI is reviewed for SOC 2, ISO 27001, or HITRUST posture, signs a HIPAA-compliant BAA, and is reassessed at least annually. A current list of subprocessors is maintained and provided to BAA-covered customers on request.

Business continuity and disaster recovery. Redundant compute and storage span multiple availability zones inside the US region. Recovery Time Objective (RTO) and Recovery Point Objective (RPO) targets are documented in our Business Continuity Plan, which is tested at least annually. Encrypted backups are isolated from production credentials and are recoverable into a clean environment.

Compliance and Standards At a Glance

VoiceboxMD’s security and compliance program is mapped to the following frameworks and standards.

HIPAA Privacy, Security, and Breach Notification Rules (45 CFR 160 and 164)
HITECH Act
NIST SP 800-66 Revision 2
NIST SP 800-53 Rev. 5
NIST Cybersecurity Framework 2.0
FIPS 140-2 Validated Cryptography
TLS 1.3 (RFC 8446)
SOC 2 Type II-Aligned Controls
OWASP ASVS Secure Development

Frequently Asked Questions

01. Is VoiceboxMD HIPAA compliant?

Yes. VoiceboxMD is a HIPAA-compliant medical dictation platform that operates as a Business Associate under 45 CFR 164.504(e). We sign a Business Associate Agreement with every customer who handles PHI, and our administrative, physical, and technical safeguards are mapped to NIST SP 800-66 Revision 2 and the HIPAA Security Rule.

02. Will VoiceboxMD sign a Business Associate Agreement?

Yes. A signed BAA is included with every paid VoiceboxMD plan at no additional charge. The BAA can be requested before purchase and is countersigned during onboarding. Email support@voiceboxmd.com to request a copy.

03. What encryption does VoiceboxMD use?

VoiceboxMD encrypts data at rest with AES-256-GCM using FIPS 140-2 validated cryptographic modules. Data in transit is protected by TLS 1.3 with AEAD cipher suites such as TLS_AES_256_GCM_SHA384 and perfect forward secrecy.

04. Where is my patient data stored?

All VoiceboxMD production data is stored and processed exclusively in US-based data centers. PHI never leaves the United States during the normal operation of the service.

05. Does VoiceboxMD store audio recordings of patient encounters?

By default, VoiceboxMD does not retain audio recordings beyond the active dictation session. Only the transcribed text is persisted for the clinician's review and handoff to the EHR. Practices that need recording retention can opt in.

06. Who can access my dictation data?

Only the authenticated user who created the dictation, plus any users that account's administrator has explicitly authorized. VoiceboxMD personnel do not have standing access to clinical content. Access is granted only through a dual-control, time-bounded, audit-logged break-glass procedure.

07. How often does VoiceboxMD undergo penetration testing?

VoiceboxMD undergoes third-party penetration testing at least annually, with continuous automated vulnerability scanning between tests. This cadence meets the annual penetration test and biannual vulnerability scan requirements anticipated by the proposed 2025 HIPAA Security Rule update.

08. Is VoiceboxMD SOC 2 or HITRUST certified?

VoiceboxMD operates SOC 2 Type II-aligned controls across the security, availability, and confidentiality criteria. Specific attestation status and the most recent reports are available to qualified customers and prospects under NDA. Contact support@voiceboxmd.com for documentation.

09. Does VoiceboxMD use my dictation data to train AI models?

No. Customer PHI is never used to train general-purpose AI models. Engine improvements are derived from de-identified, aggregate signals or from data customers have explicitly contributed to a research program, never silently.

10. What happens to my data if I cancel?

On cancellation or written request, VoiceboxMD deletes customer PHI from production within thirty days and from backups within their normal rotation. A certificate of destruction is available on request.

11. How does VoiceboxMD handle a security incident?

VoiceboxMD operates a documented Incident Response Plan, tested annually, with a containment and restoration objective consistent with the 72-hour timeline contemplated by the proposed HIPAA Security Rule. In the event of a confirmed breach of unsecured PHI, affected customers are notified without unreasonable delay and within the timelines required by 45 CFR 164.410.

12. How do I get the security documentation for my IT team?

Email support@voiceboxmd.com to request the Security and Compliance Pack. The pack includes the BAA template, the SOC 2 and penetration testing summary, the subprocessor list, the Privacy Notice, and the most recent security overview deck.

Vulnerability Reporting

VoiceboxMD values the work done by security researchers in improving the security of our service offerings. We are committed to working with the community to verify, reproduce, and respond to legitimate reported vulnerabilities. Please submit security issues to support@voiceboxmd.com. We acknowledge new reports within two business days.

Get the Documentation Your Team Needs

Request the BAA, schedule a security review, or download the Security and Compliance Whitepaper. We respond within one business day.