Trust Center

Security, compliance,
and privacy.

Grove holds patient information on behalf of independent practices across four jurisdictions. This page is our complete posture — what we comply with, how we protect data, and what we'll do when something goes wrong.

HIPAA
Compliant · BAA at signup
PIPEDA
Compliant · ca-central-1
UK GDPR
Compliant · DPA available
APPs (AU)
Compliant · ap-southeast-2
SOC 2 Type 1
In progress · Q4 2026
SOC 2 Type 2
In progress · Q2 2027
Pen testing
Annual · pre-launch + ongoing
Encryption
AES-256 at rest · TLS 1.3 transit

Compliance matrix

What Grove complies with, jurisdiction by jurisdiction, with the documentation you'll need for your own audits.

StandardStatusDocumentation
HIPAA (United States)CompliantBAA signed automatically at signup · Available on request
PIPEDA (Canada)CompliantPrivacy Policy · Provincial health act mappings · DPA on request
UK GDPR (United Kingdom)CompliantDPA available · Right of erasure · Standard Contractual Clauses
Australian Privacy Act 1988 (APPs)CompliantAPP-compliant Privacy Policy · My Health Records Act mapping
SOC 2 Type 1In progress · Q4 2026Auditor engaged · Letter of intent available on request
SOC 2 Type 2In progress · Q2 2027Will follow Type 1 completion · 6-month observation period
HITRUST CSFEvaluating · 2027Reviewing certification path post-SOC 2
Penetration testingAnnual + on major releasesExecutive summary available under NDA

How your data is protected

The technical and operational safeguards behind every Grove account.

Encryption

All data is encrypted at rest with AES-256 and in transit with TLS 1.3. Database backups are encrypted with separate keys. Encryption keys are rotated automatically and stored in AWS KMS.

Access control

Role-based access control on every record. Multi-factor authentication on every Grove staff account. Audit logs immutable for 7 years. Patient records require role plus explicit assignment to that patient.

Authentication

Email + password with optional TOTP (Google Authenticator, 1Password, etc). Magic-link sign-in available. SSO via SAML available on Enterprise plans. Passwords stored as bcrypt hashes with high cost factor.

Backups & disaster recovery

Continuous database replication with point-in-time recovery for the previous 7 days. Daily encrypted snapshots retained 90 days. Cross-region replication. Quarterly disaster recovery drills documented.

Network & infrastructure

Hosted on AWS via Supabase. WAF in front of all customer-facing endpoints. DDoS protection via Cloudflare. Internal services on private subnets with no public ingress. VPC isolation per region.

Vulnerability management

Continuous dependency scanning via GitHub Dependabot. Quarterly external penetration testing. Annual full-scope security audit. Critical vulnerabilities patched within 24 hours; high within 7 days.

Data residency

Your patient data is stored in your country. Always. No exceptions.

🇨🇦
Canada
ca-central-1
(Montreal)
🇺🇸
United States
us-east-1
(Virginia)
🇬🇧
United Kingdom
eu-west-2
(London)
🇦🇺
Australia
ap-southeast-2
(Sydney)

Sub-processors

The third-party services Grove uses to deliver our platform. All are HIPAA-eligible or covered by appropriate data processing agreements.

Sub-processorPurposeData typeRegion
Supabase (AWS)Database, authentication, file storageAll customer dataCustomer's region
StripePayment processingBilling info only · No PHIGlobal · PCI DSS Level 1
NetlifyWeb hosting, edge functionsApplication code, public assetsGlobal edge · No PHI stored
Postmark *Transactional emailEmail metadata · Encrypted content for PHIUSA · BAA signed
CloudflareDDoS, WAF, DNSRequest metadata · No PHI in transit visibleGlobal edge
AnthropicGrove Intelligence (AI features)Practitioner queries · Configurable PHI handlingUSA · Zero retention enabled
SentryError monitoringError metadata · PHI scrubbed at SDKUSA · DPA in place

* Currently using Resend for pre-launch (non-PHI emails only). Production patient-facing email migrating to Postmark with signed BAA prior to first practice going live.

Breach response

If something goes wrong, here's exactly what happens — and when.

Detection

24/7 automated security monitoring across all systems. Suspicious activity triggers immediate alerts to the on-call engineering team. Confirmed incidents are escalated to the founder within 15 minutes.

Containment

Incident response playbook executed within 1 hour of confirmation. Affected systems isolated, credentials rotated, forensic snapshots captured. External security counsel engaged.

Customer notification

Affected practices notified within 24 hours, even before full forensics are complete. We share what we know, what we don't, and what we're doing about it. No spin.

Regulatory notification

HHS OCR notification within 60 days for US incidents involving PHI. Provincial privacy commissioners notified per PIPEDA. UK ICO notified within 72 hours per GDPR. Documented and public.

Your rights, in plain language

What you and your patients can do with the data Grove holds.

Export everything

One-click export of all your practice data — patient records, appointments, messages, billing — in standard formats (CSV, JSON, FHIR). No fee, no limit, no waiting period.

Delete everything

Permanent account deletion on request. We don't hold your data hostage. Confirmation within 30 days, full deletion within 90 days (some audit logs retained per HIPAA's 6-year requirement, then destroyed).

Patient access requests

Patients can request their complete record via your practice or directly through Grove. We provide it within HIPAA's 30-day requirement, in machine-readable form.

What Grove will never do

Sell aggregated data to advertisers. Use your patient data to train AI without explicit consent. Share data with insurers, employers, or law enforcement without legal compulsion. See all our promises →

Need something for your security review?

Request our BAA, DPA, SOC 2 progress letter, penetration test executive summary, or anything else your compliance team needs.

Request documentation →