Keep data private and secure with Groopit
Privacy and security are of the utmost importance at Groopit. This is reflected in the privacy controls, technical implementation, HIPAA capabilities, and monetiziation practices.
Groopit privacy controls
Groopit organizer controls make it easy to hide confidential or sensitive data. Organizers control what data members see and what they do not see through the set-up of real-time data collection forms. Simply mark data as hidden so that confidential or sensitive information is only visible to the contributor and the organizer.
Groopit technical implementation
Groopit technical implementation follows privacy and security best practices. For example, Groopit encrypts data at rest and data in transit for all of our customers using industry standard encryption. Groopit is built on Microsoft’s Azure platform, all data is stored in Microsoft data centers, uses Microsoft’s security features and abides by Microsoft standards. We value Microsoft’s commitment to security and building Groopit on their platform reflects our commitment as well.
Built on Microsoft Azure
Operating in Microsoft data centers
Using Microsoft security features
Abiding by Microsoft security standards
- Encrypting data at rest and in transit
Groopit HIPAA capabilities
Groopit HIPAA capabilities allow organizations to collect data according to their HIPAA requirements and internal policies with a HIPAA enabled Groopit account. If you are a healthcare provider, researcher, or similar organization, Groopit can be configured to enable HIPAA compliance, including electronically protected health information (e-PHI). Contact firstname.lastname@example.org for more information
Groopit monetiziation practice
Groopit monetization practice does not sell user data. For example, Groopit does not sell user data to advertisers or to generate revenue from advertising. We believe that users own their data and it is not Groopit’s right to sell it. Instead, Groopit is a subscription service and is not monetized through advertising so your user data is not sold to advertisers.
All credit card transactions are processed using secure encryption—the same level of encryption used by leading banks. Card information is transmitted, stored, and processed securely on a PCI-Compliant network.