SECURITY AND PRIVACY
Security and privacy at the core of our operations.
From design, to deployment, to operation; security and privacy are part of the equation.
![Security and privacy](https://images.prismic.io/limeh/3293904c-3f60-4292-8175-8f92abe23198_Group+42.png?auto=compress%2Cformat&fit=max&w=1920)
SOC 2 Type II Compliance
Lime Health has successfully acquired a SOC 2 Type II audit report that encompasses the trust principles of data security, availability, and confidentiality.
![](https://images.prismic.io/limeh/650dd93cfbd9a45bcec80288_PNG_SOC-2-Type-2-e1672261614112.png?auto=format%2Ccompress&fit=max&w=750)
General Security
Nothing is left to chance in order to protect your data throughout its life cycle with practices and processes that follow the best industry standards.
![1](https://images.prismic.io/limeh/960530fa-a453-453b-8590-511393d215a9_icone+13.png?auto=compress%2Cformat&fit=max&w=128)
Securely hosted with Azure
Your data is hosted in the Azure environment which is SOCII, ISO27001 and HIPAA certified.
![2](https://images.prismic.io/limeh/a59e4719-d3fb-4530-ad1e-5476a812dfa9_icone+14.png?auto=compress%2Cformat&fit=max&w=128)
Single-Sign-On
Keep full control of your users with SSO authentication with Azure AD.
![3](https://images.prismic.io/limeh/c3779773-24ff-47da-b39f-4d723c3270b3_icone+15.png?auto=compress%2Cformat&fit=max&w=128)
Role-based access control
Limit access to data by assigning roles to your users.
![4](https://images.prismic.io/limeh/7375d838-6b93-4d3e-a653-4c13397daff1_icone+16.png?auto=compress%2Cformat&fit=max&w=128)
Content-based access control
Increase the granularity of privileges by giving only the necessary content access in read or write mode.
![5](https://images.prismic.io/limeh/6249e4b0-2eb8-4a2b-ab34-d73b1ec2723f_icone+17.png?auto=compress%2Cformat&fit=max&w=128)
Audit trails
All activities are recorded and collected in logs and audit reports.
![6](https://images.prismic.io/limeh/df909809-8d0e-4e6c-87f2-43622725f973_icone+18.png?auto=compress%2Cformat&fit=max&w=128)
Protection of personal information
Your data is protected by firewalls and intrusion prevention and detection systems.
![7](https://images.prismic.io/limeh/b911fc8e-4a81-4cda-a451-7ed4271057cc_icone+19.png?auto=compress%2Cformat&fit=max&w=128)
Security backup
Your data is backed up continuously and copies are kept in separate geographical areas.
![8](https://images.prismic.io/limeh/fd0a1b7c-d3c2-4fa5-9432-802c1d23e7bb_icone+20.png?auto=compress%2Cformat&fit=max&w=128)
Employee training
All of our employees receive ongoing security and privacy training.