MIM Software Security

Security at Every Level

MIM Software is committed to safeguarding the systems, infrastructure, and information of the clinicians that improve patients’ lives around the planet. We are deeply committed to security at every level of our development life cycle, from risk assessments during design and requirement gathering to ongoing penetration testing and continuous vulnerability scanning of released products. To help ensure your privacy, safety, and trust, we have designed our software and services according to comprehensive cybersecurity standards and validate our compliance with both internal and external audits.

AICPA SOC 2 Type 2 Status

What is SOC 2?

SOC 2 for Service Organizations certifies that we report on controls at our organization that are relevant to security, availability, processing integrity, confidentiality, or privacy.

We supply these reports to meet the request of users seeking detailed information and confirmation about our controls. In addition, the SOC 2 report helps validate oversight of the organization, vendor management programs, internal corporate governance, regulatory oversight, and risk management processes.1

What does this mean for you?

Our SOC 2 Type 2 status solidifies our promise of security and privacy for our customers.

AICPA SOC aicpa.org/soc4so SOC for Service Organizations | Service Organizations ™

Stronger Together

MIM Software is eager to work with any security researchers who believe that they have identified a potential weakness or vulnerability in our software, services, or infrastructure. We follow the US Federal Cybersecurity and Infrastructure Security Agency’s recommendations for coordinated vulnerability disclosure. For the safety and protection of our customers and their patients, it is our policy not to publicly comment on or discuss any potential vulnerability until it has been confirmed and, if applicable, a software patch is available. Our engineers and security experts are active and responsive on the CERT/CC Vulnerability Information and Coordination Environment. If you believe that you have identified a vulnerability in any of our software or services, please contact us immediately at security@mimsoftware.com.

Click here to view our security advisories.

Footnotes