top of page

Security Statement


myLifeLog takes every precaution to protect our users' information. Only employees who need the information to perform a specific job are granted access to personally identifiable information.


HIPAA Compliance

To protect the confidentiality of information or electronic data including Protected Health Information as defined by HIPAA Privacy Rule 45 CFR Part 164 (collectively, "Data"), myLifeLog uses the following physical and electronic safeguards:


Authentication and Passwords

A valid user ID and password is required for online access to enter the application systems and/or access Data maintained in our online application systems. In addition, we log and track every individual who gains access to your Data.


Internet security and encryption

We utilize Internet security features to protect Data from unauthorized external access. All data exchanges and Internet communications are performed with a secure server, using Secured Socket Layers (SSL) at 128-bit or higher data encryption are used to prevent authorized users from intercepting transmitted data. Data is protected from unauthorized external access through the use of proxy servers and firewalls. Critical account access information (passwords, secret questions/answers) are encrypted in the database so they will be indecipherable to those who are able to access the database.


Access to your data

We restrict access to Data only to authorized personnel. All myLifeLog employees and agents with access to databases have signed confidentiality agreements, which forbid any use of the data beyond supporting myLifeLog' working needs. Security levels further limit particular aspects of a client's data to specific personnel. We also impose user restrictions upon individuals authorized to access electronic Data to limit access or modification of Data.


Physical security

The physical environment of computer systems containing Data is highly secured. Each data center is constructed with power supply redundancy, sophisticated environmental controls and a full security system that limits physical access to computer hardware to only individuals holding a valid electronic key card and a personal identification number.


Please inform us if you feel that anyone has attempted unauthorized access to your information by emailing



bottom of page