← Back to Home

Security Practices

Last Updated: April 28, 2026

Security-First Architecture

At VoiceUp Athletics, security is not an afterthought—it's built into every layer of our platform. We employ enterprise-grade security measures to protect your sensitive mental health information and ensure the confidentiality of all communications.

This page provides transparency about our security practices, technologies, and ongoing commitment to protecting your data.

End-to-End Encryption

AES-256 encryption for data at rest and TLS 1.3 for data in transit. Your conversations are encrypted before storage.

24/7 Monitoring

Continuous security monitoring with automated threat detection and immediate incident response protocols.

Secure Infrastructure

HIPAA-compliant cloud hosting with redundant systems, automated backups, and disaster recovery plans.

Access Controls

Role-based permissions, multi-factor authentication, and principle of least privilege access.

1. Data Encryption

1.1 Encryption at Rest

All data stored in our systems is encrypted using industry-standard AES-256 encryption:

  • Message Content: All conversations are encrypted before being written to the database
  • Personal Information: User profiles and account details are encrypted
  • Database Encryption: Full database encryption with separate encryption keys per university (data isolation)
  • File Storage: Any uploaded files are encrypted with unique keys
  • Backups: All backup data is encrypted using the same standards

1.2 Encryption in Transit

All data transmitted between your device and our servers is protected:

  • TLS 1.3: Latest Transport Layer Security protocol for all connections
  • Perfect Forward Secrecy: Each session uses unique encryption keys
  • Certificate Pinning: Protection against man-in-the-middle attacks
  • HSTS Enabled: Browsers automatically use secure connections

1.3 Key Management

  • Encryption keys stored in hardware security modules (HSMs)
  • Regular key rotation following industry best practices
  • Multi-party authorization required for key access
  • Keys never stored in application code or configuration files

2. Access Control and Authentication

2.1 User Authentication

  • Strong Passwords: Minimum requirements (8+ characters, uppercase, lowercase, numbers, special characters)
  • Password Hashing: bcrypt with adaptive cost factor (never stored in plain text)
  • Multi-Factor Authentication: Required for administrative accounts
  • Session Management: Secure, httpOnly cookies with SameSite protection
  • Auto-Logout: Automatic session termination after inactivity
  • Account Lockout: Temporary lockout after failed login attempts

2.2 Role-Based Access Control (RBAC)

Every user is assigned a specific role with precisely defined permissions:

  • Athletes: Access only to their own conversations and profile
  • Counselors: Access only to assigned conversations (anonymous athlete IDs only)
  • University Admins: User management for their university; no access to conversation content
  • Platform Admins: System administration; all access logged and audited

2.3 Principle of Least Privilege

Users and systems are granted only the minimum access necessary to perform their functions. Access is reviewed quarterly and revoked immediately upon role changes or termination.

3. Infrastructure Security

3.1 Cloud Hosting

  • Provider: HIPAA-compliant cloud infrastructure (AWS/Google Cloud with BAA)
  • Data Centers: SOC 2 Type II certified facilities
  • Geographic Redundancy: Data replicated across multiple availability zones
  • Physical Security: 24/7 surveillance, biometric access, and security guards

3.2 Network Security

  • Firewalls: Next-generation firewalls with intrusion prevention
  • DDoS Protection: Automated distributed denial-of-service mitigation
  • Network Segmentation: Isolated networks for different security zones
  • VPN Access: Required for administrative access to production systems
  • Private Subnets: Database and sensitive services isolated from public internet

3.3 Application Security

  • Security Headers: CSP, HSTS, X-Frame-Options, and other protective headers
  • Input Validation: All user inputs sanitized to prevent injection attacks
  • Output Encoding: Protection against XSS (cross-site scripting)
  • CSRF Protection: Token-based protection for state-changing operations
  • Rate Limiting: Protection against brute force and abuse
  • SQL Injection Prevention: Parameterized queries and ORM usage

4. Monitoring and Incident Response

4.1 Security Monitoring

  • 24/7 Monitoring: Automated security information and event management (SIEM)
  • Log Aggregation: Centralized logging of all security-relevant events
  • Anomaly Detection: Machine learning-based detection of unusual patterns
  • Vulnerability Scanning: Continuous automated scanning for vulnerabilities
  • Uptime Monitoring: Real-time availability and performance monitoring

4.2 Audit Logging

We maintain comprehensive audit logs for compliance and security:

  • Access Logs: Every access to sensitive data is logged with user ID, timestamp, and IP address
  • Administrative Actions: All admin actions logged with details and justification
  • Authentication Events: Login attempts, password changes, and account modifications
  • System Changes: Configuration changes and system updates logged
  • Retention: Logs retained for 7 years for compliance purposes
  • Tamper-Proof: Logs stored with integrity verification (cannot be altered)

4.3 Incident Response Plan

We maintain a documented incident response plan with defined procedures:

  • Detection: Automated alerts for security incidents
  • Triage: Rapid assessment and prioritization
  • Containment: Immediate isolation of affected systems
  • Eradication: Removal of threats and vulnerabilities
  • Recovery: Restoration of normal operations
  • Post-Incident Review: Analysis and improvement of security controls

4.4 Response Times

  • Critical Security Incidents: Response within 1 hour
  • High-Priority Issues: Response within 4 hours
  • Medium-Priority Issues: Response within 24 hours
  • Low-Priority Issues: Response within 72 hours

5. Data Protection and Privacy

5.1 Data Isolation

University data is strictly isolated to prevent cross-contamination:

  • Logical Separation: All queries filtered by university_id
  • Encryption Keys: Separate encryption keys per university
  • Database Constraints: Foreign key relationships enforce data boundaries
  • Application Logic: Middleware automatically scopes queries

5.2 Anonymity Protection

  • Athletes identified only by anonymous display names to counselors
  • Conversation metadata does not link to identifiable information
  • Real identities protected even from university administrators
  • IP addresses and device information not stored in conversation records

5.3 Data Retention and Deletion

  • Retention Period: 7 years for clinical records (industry standard)
  • Secure Deletion: Cryptographic erasure for deleted data
  • Right to Deletion: Users can request account deletion (processed within 30 days)
  • Backup Purging: Deleted data removed from backups after retention period

6. Security Testing and Audits

6.1 Penetration Testing

  • Frequency: Bi-annual third-party penetration tests
  • Scope: Full application, infrastructure, and network testing
  • Methodology: OWASP Top 10 and custom threat modeling
  • Remediation: Critical findings resolved within 7 days

6.2 Vulnerability Management

  • Continuous automated vulnerability scanning
  • Dependency scanning for third-party libraries
  • Regular patching and updates (critical patches within 48 hours)
  • Bug bounty program for responsible disclosure

6.3 Compliance Audits

  • HIPAA Compliance: Annual third-party audit
  • SOC 2 Type II: Annual certification (in progress)
  • Internal Audits: Quarterly security control reviews

7. Business Continuity and Disaster Recovery

7.1 Backup Strategy

  • Frequency: Continuous replication + daily snapshots
  • Encryption: All backups encrypted with AES-256
  • Geographic Distribution: Backups stored in multiple regions
  • Retention: Daily backups for 30 days, weekly for 1 year
  • Testing: Monthly restore drills to verify integrity

7.2 Disaster Recovery

  • RTO (Recovery Time Objective): 4 hours
  • RPO (Recovery Point Objective): 1 hour
  • Failover: Automated failover to standby systems
  • DR Drills: Quarterly disaster recovery exercises

7.3 High Availability

  • Uptime SLA: 99.9% availability
  • Load Balancing: Traffic distributed across multiple servers
  • Auto-Scaling: Automatic capacity adjustments based on demand
  • Health Checks: Continuous monitoring with automatic recovery

8. Employee Security

8.1 Background Checks

All employees with access to production systems undergo:

  • Criminal background checks
  • Employment verification
  • Reference checks

8.2 Security Training

  • Onboarding: Mandatory security training for all new hires
  • Annual Training: HIPAA, security awareness, and privacy training
  • Phishing Simulations: Quarterly phishing awareness tests
  • Incident Response: Regular tabletop exercises

8.3 Access Policies

  • Signed confidentiality agreements for all employees
  • Immediate access revocation upon termination
  • Quarterly access reviews
  • Separation of duties for critical functions

9. Reporting Security Issues

We take security issues seriously. If you discover a security vulnerability:

Responsible Disclosure Program

  • Email: security@voiceupathletics.com
  • PGP Key: Available upon request
  • Response Time: We acknowledge reports within 24 hours
  • Bug Bounty: Eligible findings may qualify for rewards

Please do not publicly disclose vulnerabilities until we've had a chance to address them.

10. Third-Party Security

All third-party vendors are carefully vetted:

  • Security questionnaires and assessments
  • SOC 2 certification requirements
  • Business Associate Agreements for PHI access
  • Regular vendor security reviews
  • Contractual security requirements

Security is Our Priority

We continuously invest in security infrastructure, processes, and people to ensure your mental health data remains protected and confidential.