Trust

Security & compliance.

Oralstack handles dental clinic records. Security is part of how the product is built — not a checkbox at the end. This page describes our current posture honestly. Where we are working toward a control rather than already meeting it, we say so. Reviewed quarterly; last reviewed 28 April 2026.

Where data lives

Region-hosted, tenant-isolated, encrypted end-to-end.

  • Region hosting · Singapore

    Production runs in Google Cloud's asia-southeast1 region (Singapore). Patient data does not leave the region without explicit consent. The marketing site is on Cloudflare Pages with the same APAC-first edge profile.

  • Tenant isolation · row-level

    Every clinic record is tagged with a tenant ID at the database row level. Postgres Row-Level Security policies enforce isolation in the database, not just the application — a missing tenant filter in code cannot cross clinics.

  • Encryption · in transit and at rest

    TLS 1.3 in transit; AES-256 at rest for database, backups, and uploaded imaging. Sensor-bridge integration uses the OS-level secure channel; no patient data is written to local disk.

How access is controlled

MFA, role-based access, an audit log engineers cannot disable.

  • Multi-factor authentication

    MFA is required for all user accounts, with TOTP support out of the box. Recovery flows route through a verified channel — never the email address that lost MFA in the first place.

  • Role-based access · least privilege

    Roles are defined per clinic — front desk, hygienist, clinician, owner. The role determines which routes the user can reach and which audit-log entries they can read. SSO via Google Workspace and Microsoft 365 is in production; SingPass is in beta.

  • Audit log · append-only

    Reads and writes against patient data are written to an append-only audit log: who, what, when, from where. The log is queryable by clinic admins. Engineers cannot disable the audit log; entries are retained for 7 years unless a clinic explicitly requests purge.

Backups, recovery, and incidents

Daily backups, tested restores, public status, vulnerability disclosure.

  • Backups · daily, integrity-verified

    Daily encrypted backups with point-in-time recovery. Restore RPO target: 15 minutes. RTO target: 1 hour. Integrity-verified restore drills run on a fixed cadence — not just backups taken, backups tested.

  • Status & uptime

    Live platform status, target uptime, scheduled maintenance, and the incident-response posture live on the status page. Customer admins are notified by email when an incident affects a service their clinic depends on.

  • Vulnerability disclosure

    Report a vulnerability to security@oralstack.com. We acknowledge within 2 working days and confirm a fix or mitigation timeline within 7.

Compliance posture

What's in place today, what's available on request, what's on the roadmap.

  • Live

    Singapore PDPA

    The data model is designed against Singapore PDPA from day one — clinics remain the data controller; Oralstack acts as data intermediary. Tenant-isolated, region-hosted, consent-tracked.

  • Live

    HIPAA Privacy & Security Rule alignment

    The platform is built against HIPAA Privacy/Security Rule requirements (administrative, physical, and technical safeguards). Not yet HIPAA-attested by a third party — that is on the 2026 roadmap.

  • Available

    Business Associate Agreement (BAA)

    A BAA is available for clinics that require one. Contact hello@oralstack.com to request the current draft for legal review before pilot signing.

  • Available

    Data Processing Agreement (DPA)

    A DPA is available for clinics with PDPA, GDPR, or other data-protection-regulation obligations. Includes the controller/processor role model, subprocessor list, and SCC reference where applicable.

  • Roadmap

    SOC 2 Type II

    Targeted for second half of 2026. We're tracking the controls today, with a third-party auditor selection in Q3.

  • Roadmap

    HIPAA third-party attestation

    Targeted alongside the SOC 2 audit — a single audit window covering both frameworks where the controls overlap.

We don't claim certifications we haven't earned. The roadmap items above are tracked transparently and updated on this page.

Security questionnaire or controls walkthrough?

Procurement teams can request a completed security questionnaire (CAIQ-Lite or your own template) and a 30-minute controls walkthrough with the engineer who runs the infrastructure. Two working days for a first response.