VisitOMSSecurity & ComplianceBAA / DPA availableAudit trails
Built for sensitive child and family data — with practical safeguards.
VisitOMS is designed around healthcare-style expectations (administrative, physical, and technical safeguards), role-based access, and evidence trails that support operational accountability.
Trust overview
One-page summaryData isolation
organization-scoped access patterns
Agreements
BAA/DPA available on request
SecurityTrust & Reliability
Safeguards designed for real agency workflows
We focus on confidentiality, integrity, and availability of sensitive data — while keeping the system usable for field work.
Role-based access control
Admin / Provider / Parent portals with least-privilege boundaries.
Organization data isolation
Multi-tenant separation so each organization only sees its own data.
Audit logs & evidence trail
Critical actions can be tracked for accountability and compliance needs.
Secure documents
Controlled upload/download behavior and organization-scoped storage.
Operational safeguards
Practical session handling designed for real agency workflows.
Incident response posture
Security incidents are tracked, assessed, mitigated, and communicated.
SecurityTrust & Reliability
Agreements and data handling
We support standard contractual building blocks agencies expect.
BAA (Business Associate Agreement) available
If your organization is a Covered Entity or Business Associate and PHI is involved, we can provide a BAA template for legal review and execution.
DPA (Data Processing Agreement) available
For Personal Data processing, we support a DPA defining privacy roles, security measures, and retention/deletion expectations.
Confidentiality commitments
We treat Customer Data as confidential information and protect it with reasonable safeguards and contractual protections.
Data return & deletion
Upon termination, customers can request export within an agreed window (e.g., 30 days). After that, data may be deleted/anonymized per retention policy (subject to DPA/BAA or legal requirements).
SecurityTrust & Reliability
FAQ
The questions prospects will ask — answered clearly.
Do you sign a BAA?
Yes, when PHI is involved and the customer is a Covered Entity/Business Associate (templates available on request; final reviewed by counsel).
How do you support audits?
Audit logs + evidence trail connecting visits, notes, signatures, documents, and skill history into a traceable record.
Can we export our data?
Yes. Data export is available on request. After termination, export can be requested within an agreed window before deletion/anonymization.
What about spotty internet in the field?
Workflows are designed for field conditions; we can demonstrate patterns for queued actions/retries so critical work is not lost.
Trust-first30 minutesQ&ABAA/DPA review
Want a security-focused demo?
We can walk through role permissions, audit logs, evidence trails, and your compliance expectations — using your real workflow.
Note: This page is a high-level overview. Full contractual documents (BAA/DPA) can be provided upon request.
