Binti takes security very seriously.
All of the information gathered is transmitted and stored with secure encryption.
A message from our Binti Security team:
Zendesk is the third-party software Binti Customer Support utilizes to meet chat, email and phone needs of our clients.
Binti currently maintains a Business Associate Agreement (“BAA”) with Zendesk and we opted into their “HIPAA Enabled Account” option for our Zendesk Enterprise service.
Chat is the most secure component by which to communicate.
To protect any potential PHI/PII shared in a chat encounter, unless you’ve used the chat feature to request the chat transcript, the email you receive will not include the transcript. If you wish to receive the chat transcript, please respond to the email received and our Support team will provide you with the chat transcript after having removed any PHI/PII.
For any email communication that is sent by a client to our Binti customer support staff, the latest security settings are configured via Zendesk. We cannot guarantee the security of Zendesk emails that are sent to the client's mailbox and recommend using chat if possible.
We request for any additional PHI/PII context to be set securely via a secure email mailbox only accessible to a limited number of employees.
Binti Customer Support Security Protocol
All Binti Customer Support Associates are to take all necessary measures to protect PHI/PII.
Name + any of the following:
Name (acceptable) + none of the following:
Feel free to contact us via phone or email with any questions regarding how we secure customer support communications. We can be reached at email@example.com, firstname.lastname@example.org, or email@example.com.
For NIST Special Publication 800-63B Authentication and Lifecycle Management, Binti complies with level AAL1. If Single Sign-On (SSO) is set up with Multi Factor Authorization, Binti complies with AAL2.
Binti requires a password to be at least 8 characters and can be up to 4096 characters. We additionally check passwords against a list of banned passwords that include the corpuses of multiple breaches, and lists of common passwords. There is a limit of 5 attempted password resets before a user's account is locked.
Feel free to contact us via phone or email with any questions regarding our password policy. We can be reached at firstname.lastname@example.org or email@example.com.