SCA Health logo
SCA Health logo
Skip to main content
Your Next Step powered by INTOO logo
  •  Log in
SCA Health logo
SCA Health logo
Skip to main content
  •  Log in

SECURITY STATEMENT


Compliance

Your Next Step logo

All INTOO LLC products are SOC2 Type 2 certified in the Trust Services Criteria category of Security. If you require a copy of our current SOC2 Type 2 report, please contact your customer success or sales manager for assistance.

Access and Authentication Controls

INTOO LLC restricts access to customer and confidential data on a business need to know basis. Access is granted based on one’s role within the organization. INTOO LLC enforces mandatory multi-factor authentication for all access to confidential data.

Data Handling and Data Privacy

Data privacy is taken seriously at INTOO LLC. We regularly monitor changing data privacy laws and regulations and update our policies and procedures accordingly. Data privacy training is provided to all employees upon hire and regularly thereafter. Data privacy is taken into consideration during all phases of application development.

  • INTOO LLC maintains compliance with the European Union’s General Data Protection Regulation (GDPR).
  • We rely on the E.U. Commission approved standard contractual clauses for data transfer from the EEA to the United States. We have policies and procedures in place to comply with any applicable data privacy laws.

For more information on types of data and for what purpose, please refer to the product tab of our Privacy Policy.

Data Encryption

INTOO LLC utilizes full end-to-end encryption. INTOO LLC requires HTTPS for all services using TLS 1.2 with only the most secure cipher suites. INTOO LLC leverages AWS for data encryption in transit (TLS) and at rest (AES-GCM 256). INTOO LLC currently uses the TLS-1-2-2017-01 Security Policy on AWS Application Load Balancers and within AWS CloudFront. INTOO LLC uses the AWS Key Management Service (KMS) to enable data at rest encryption across our products. We use this for encrypting data within databases (RDS), and data stored within S3. AWS KMS uses the Advanced Encryption Standard (AES) algorithm in Galois/Counter Mode (GCM) with 256-bit secret keys.

Data Center Location

INTOO LLC operates within Amazon Web Services (AWS). AWS follows the Shared Responsibility Model. AWS is responsible for the security of the cloud, and INTOO LLC is responsible for security in the cloud. Information regarding the compliance of AWS data centers can be found on the AWS compliance website here. If you are required to review the data center SOC report, you can review the latest AWS SOC3 report located here: AWS SOC3 Report.

You are able to select your data storage location based on your data localization requirements. Currently we operate data centers in the United States and Europe.

Product Production Database Disaster Recovery Database

YourNextStep, INTOOCandidate, INTOOClient


Amazon AWS Data Center in the United States, Northern Virginia (us-east-1) Amazon AWS Data Center in the United States, Ohio (us-east-2)

Your-Latitude (Option 1)


For customers wishing their data reside in the United States
Amazon AWS Data Center in the United States, Northern Virginia (us-east-1) Amazon AWS Data Center in the United States, Ohio (us-east-2)

Your-Latitude (Option 2)


For customers wishing their data reside in the EU
Amazon AWS Data Center in Italy, Milan (eu-south-1) Amazon AWS Data Center in Germany, Frankfurt (eu-central-1)

Data Backups and Retention

INTOO LLC maintains one year of database backups, audit, and application logs. These backups are stored encrypted in accordance with the Data Encryption section listed above. To submit a data deletion request, please use the Individual Rights Manager located in the footer of every page on our site..

Awareness and Training

All INTOO LLC employees complete mandatory security awareness and privacy training upon hire and at least once annually on an ongoing, regular basis. All INTOO LLC employees and contractors sign confidentiality and non-disclosure agreements upon hire and before access to company or customer data.

Business Continuity / Disaster Recovery

INTOO LLC engineers have designed highly scalable and resilient product architecture within AWS. Our product withstands sophisticated attacks and is highly adaptable. Our systems’ performance within the product architecture is monitored for key metrics, ensuring the load on any one system is within an acceptable range. Should any components become overloaded or experience a fault, automated processes will be executed to bring online additional temporary systems or to cycle out existing systems for new ones. Automation is built into the INTOO LLC architecture, so system monitoring, updates, and corrective actions can take place as needed with minimal to no downtime.

INTOO LLC maintains a full DR environment and tests the DR Plan on an annual basis to ensure RPO and RTO objectives can be met.

Code Security & Updates

The INTOO LLC egineering department leverages a Continuous Integration / Continuous Delivery (CI/CD) pipeline for managing code deployments. Application code is stored in a secure code repository with full version control. Code changes are peer reviewed and tested in a staging environment before they are pushed into production. The staging and production environments are logically separated, and no data is shared between them.

Logging and Monitoring:

INTOO LLC collects audit and application logs from all systems. These logs are stored encrypted in a centralized logging location facility separate from the system generating the logs. The log entries are in line with industry standards for audit trails. INTOO LLC maintains these logs for a period of one year for the business purpose of investigating past system activity.

Remote and mobile device management (RMM/MDM)

We secure our employees' machines and laptops using remove management and mobile device management tools to ensure that each device follows our information security standards, including encryption, patch management, and device controls.

Penetration Testing / Vulnerability Scanning

INTOO LLC conducts external penetration testing of our products on an annual basis. Further, INTOO LLC performs weekly scans using an industry-leading vulnerabilty scan tool. Any vulnerabilities found during these processes are added to our vulnerability tracking program. Security Vulnerabilities are remediated in accordance with the following schedule:

Priority Critical (P0) High (P1) Medium (P2) Low (P3)

Remediation Timeline


7 days 14 days 90 days Discretionary


[Latest Page Update: 02/28/2023]

  • Terms of Service
  • Privacy Policy
  • Copyright Notice
  • Cookie Policy
  • Security
  • Contact Us
  • Help Center
  • TrustArc
Surgical Care Affiliates is a service provided by INTOO LLC, the owner and operator of this website.
INTOO LLC, 10880 Wilshire Blvd., Los Angeles, California 90024, USA • Delaware limited liability company (File Number: 7949147)
Copyright © 2025 INTOO LLC. All rights reserved.

Timeout Warning

For your protection, you are about to be automatically signed out. Click Keep Working now to stay signed in.

Sign Out Now Keep Working