Privacy Policy

Multiple clients trust Meditask Solutions with their data and privacy. We place the highest importance on data security and confidentiality. To protect customer, employee, and business data, we implement a range of security features and a Secured Systematic Data Handling Approach. Our customers can rest assured that their data is safe, their communication is secure, and their businesses are protected.

Security Policy

Departmental Approach
We maintain confidentiality by employing a departmental approach. Comprehensive product knowledge, including ticketing information, and call center transcripts, is securely stored within system resources specific to each customer department. This ensures that call center agents have immediate, internal access to all necessary information, enabling quick and secure correspondence without external interaction.

Data Communication
Strict system rules ensure that leads and transcript information are automatically sent to the customer via email or CRM, unless the client requires submission on their online forms.

Communication Encryption
All communications between browsers, users, and servers are encrypted using industry best-practice protocols, HTTPS, and Transport Layer Security (TLS), over public networks.

Product Security
Two-Factor Authentication
2-Step Verification enhances the security of agent accounts. With 2-Factor Authentication enabled, any login attempt must be accompanied by a code generated in the Google Authenticator app, providing an additional layer of security even if the password is compromised.

HTTPS Encryption
All hosted accounts operate over secure connections using the HTTPS protocol. This ensures that all communications between the browser and agents, including email exchanges, are encrypted.

Secure Credential Storage
We adhere to the latest best practices for storing and protecting user login credentials and passwords in the cloud.

IP & Network Restrictions
The agent panel can be configured to allow access only from specific IP address ranges, enhancing security.

Server Environment
Our servers are hosted in Tier III+ or IV facilities that comply with PCI DSS, SSAE-16, or ISO 27001 standards. These data centers are equipped with redundant power, UPS, and backup generators.

Server & Device Monitoring
All operational network systems, devices, and circuits are constantly monitored and managed by administrators. Physical security, power, and internet connectivity are ensured beyond co-location cage doors.

Data centers in the United States, Europe & Asia
Data is hosted in multiple data centers based on customer preference or geographical location, including options in the United States, Europe, and Asia. Customers can choose to locate their service data in the US-only or Europe-only regions.

Network Protection
Our network, or partner networks, are protected by redundant firewalls, advanced router technology, secure HTTPS transport over public networks, and network Intrusion Detection and/or Prevention Systems (IDS/IPS) to monitor and block malicious traffic and network attacks.

Contact Privacy
SMS opt-in or phone numbers for the purpose of SMS are not being shared.(including third-parties or affiliates)

Security Zones
Our network security architecture consists of multiple security zones. More sensitive systems, such as application servers and database servers, are placed in highly trusted zones, while other systems, like load balancers, are housed in zones appropriate to their sensitivity based on their function, information classification, and risk.

Third-Party Security Research
In addition to our extensive internal scanning and testing programs, we collaborate with third-party security experts and researchers to conduct security assessments and penetration tests.

Vulnerability Scanning
Regular network security scans provide us with detailed insights, enabling the quick identification of non-compliant or potentially vulnerable systems.