At Pleiades, we understand that privacy and security are paramount when it comes to mental health services. We've implemented multiple layers of protection to safeguard your personal information and therapeutic conversations.
End-to-End Encryption
All communications between you and your therapist are protected with end-to-end encryption. This means that only you and your therapist can read the messages you exchange—not even our technical team can access the content of your conversations.
Our encryption uses industry-standard protocols to ensure that your data remains secure both in transit and at rest.
HIPAA Compliance
Pleiades is fully HIPAA-compliant, meeting all federal regulations for protecting sensitive patient health information. Our platform is built from the ground up with these regulations in mind:
- Regular security assessments and audits
- Strict access controls for all patient data
- Comprehensive staff training on privacy procedures
- Business Associate Agreements with all service providers
For more details about our HIPAA compliance, see our HIPAA Compliance Guide.
Secure Video Sessions
Our video therapy platform incorporates advanced security features:
- Encrypted video connections using WebRTC technology
- No recording or storage of video sessions
- Unique, one-time session links for each appointment
- Waiting room functionality to prevent unauthorized access
Multi-Factor Authentication
To prevent unauthorized account access, we offer multi-factor authentication. This adds an extra layer of security by requiring a second form of verification beyond your password.
We recommend enabling this feature for maximum account protection. Learn how to set it up in Securing Your Account.
Secure Data Storage
All data stored in our systems is protected using:
- AES-256 bit encryption for all stored data
- Separation of identifying information from clinical notes
- Redundant, geographically distributed backups to prevent data loss
- Regular security testing and vulnerability assessments
Incident Response
We have a comprehensive incident response plan in place to address any potential security issues:
- 24/7 monitoring for suspicious activities
- Dedicated security team ready to respond to alerts
- Regular testing of our response procedures
- Transparent communication in case of any security events
Your Role in Data Security
While we implement robust security measures on our end, your actions also play an important role in keeping your account secure:
- Use a strong, unique password for your Pleiades account
- Enable multi-factor authentication
- Log out when using shared computers
- Keep your recovery email and phone number updated
- Be cautious about accessing your account on public Wi-Fi
For more detailed guidance on how to keep your account secure, please visit our Account Security page.
Questions About Security
If you have any questions or concerns about our security practices, please don't hesitate to contact our support team. We're committed to maintaining the highest standards of data protection and are always happy to provide more information about our security measures.