Security

Security and BAA posture.

Medi handles PHI for billing companies and the practices they bill for. This page states the controls plainly, including the certifications we have not earned yet. A buyer reviewing Medi should be able to verify the posture without a demo.

Plain boundary

BAA before PHI. No certifications we have not earned.

We sign a Business Associate Agreement before any production PHI workflow goes live. We do not claim SOC 2 or HITRUST certification because we are not yet certified (SOC 2 Type II is on the roadmap, but not earned yet). Medi is reviewable through contractual BAA, documented controls, audit logging, and implementation due diligence.

BAA before any PHI workflowServer-side Auth.js sessions and access guardsSeven-year audit log retention per HIPAA §164.312(b)

Controls

What an IT reviewer can verify.

Concrete controls your IT team or compliance reviewer can map to HIPAA Security Rule technical safeguards (§164.312). The list is what Medi actually does, not what a certification badge would imply.

Review packet

Security review packet.

The shape of a buyer-side security review for a billing company, owner, or IT reviewer before production work starts.

BAA and implementation boundary

We sign a BAA before any PHI workflow goes live. The implementation review documents where the production boundary is and what your team needs to confirm before crossing it.

Access and audit controls

Server-side session checks (Auth.js), role-based authorization, practice-scoped access guards, and audit logging covering PHI reads and writes. Documented enough for an IT reviewer to verify the controls without a demo.

Certification status, stated plainly

Pre-certification: SOC 2 Type II and HITRUST are on the roadmap but have not been earned yet. Medi is reviewable through contractual BAA, documented controls, audit logging, and the implementation due-diligence process — not through certification badges we cannot show.

Subprocessor and infrastructure review

Documented list of hosting infrastructure, clearinghouse (Stedi), and data processors. Available during implementation review for teams that need formal IT sign-off before go-live.

Implementation review

What gets confirmed before your team runs live work.

Business Associate Agreement signed before any production PHI workflow
Role and practice-access review during implementation
Audit log review for PHI-sensitive workflows
Subprocessor and infrastructure review before go-live