HIPAA / HITECH Compliant

Security at SnapNotes

SnapNotes was built by a practicing clinician who understands what's actually at stake. Your clients' data is not a product. It is protected, encrypted, and entirely under your control.

Business Associate Agreement (BAA) →
HIPAA Compliant Full BAA available
Encrypted at Rest AES-256
Encrypted in Transit TLS 1.2+
You Delete, It's Gone No retention after deletion
Zero Staff Access Not even us
Core Protections

You Control Your Data

When you delete a session, it is permanently and immediately removed from our servers. No backups, no retention windows, no exceptions.

HIPAA Compliance & BAA

SnapNotes operates as your Business Associate under HIPAA. We execute a formal BAA with every subscriber and maintain policies aligned with 45 C.F.R. Parts 160 and 164.

End-to-End Encryption

All data is encrypted in transit using TLS and encrypted at rest using AES-256. Your transcriptions are protected from the moment they leave your device.

Zero Staff Access

No SnapNotes employee or contractor can read the contents of your sessions. Your client data is yours alone — full stop.

Secure Authentication

Multi-factor authentication, session management, and secure credential handling protect access to your account at every layer.

Privacy-Preserving AI

SnapNotes uses AI models under strict data processing agreements. Session content is never used to train external models or shared with third-party AI providers beyond what's required to generate your note.

Infrastructure & Operations

Isolated Server Environment

SnapNotes runs in a dedicated, isolated environment. Strict resource limits and file handling policies prevent overloads and protect stability.

Role-Based Access Control

Internal system access is governed by least-privilege principles. Staff only have access to what is operationally necessary — never to PHI.

API Security

All API endpoints are protected with authentication and authorization checks. Data exchange is validated and logged at the application layer.

Monitoring & Logging

We maintain detailed operational logs — not session content — to detect anomalous behavior, support incident response, and ensure system integrity.

Subcontractor Oversight

Any subprocessor that handles PHI on our behalf is contractually bound to the same security standards and HIPAA obligations we hold ourselves to.

Breach Notification

In the unlikely event of a security incident, we will notify affected covered entities within 30 days of discovery, consistent with our BAA and 45 C.F.R. § 164.410.

Built by a clinician, for clinicians. SnapNotes was created by a practicing LCSW who uses the platform in real clinical work. Security and privacy are not features — they are the foundation. Every architectural decision reflects the standard of care we owe our clients.

Our Commitment to Your Privacy

Your trust is the foundation of everything we do. We are dedicated to handling your data with the care it deserves — not just because HIPAA requires it, but because your clients deserve it.

For full details, please review our Privacy Policy and Terms of Use. If you have specific questions about our security posture or want to discuss enterprise arrangements, reach out directly.

View Business Associate Agreement