Skip to main content

Berries Privacy Promise

Learn how Berries keeps your data safe, secure, and under your control.

Updated over 2 weeks ago

Here are the privacy pillars that serve as the foundation for our decisions as we develop and enhance Berries:​​​​​​​​

  • Safeguarding Health Information: Our stringent security protocols and practices are designed to ensure the safety of your health information.

  • Empowering You with Control: You have full control over your data. That's why you have the ability to manage and control your personal information.

  • No Compromise on Privacy: Never compromise your privacy. We do not engage in any activities that involve selling your information.

The steps we take to keep your data secure:

  • Trustworthy Team: Our team undergoes strict background checks and receives ongoing training on privacy and information security.

  • Compliance and Accountability: Our privacy team is responsible for security and privacy and we perform regular assessments of our policies and practices.

  • Privacy-Oriented Development: Privacy protection is considered at every stage of our software development process.

  • Session Recordings Policy: Session recordings are temporarily saved in a secure and HIPAA-compliant manner until notes are completed. Then, they are automatically deleted and not retained.

  • Secure Data Storage: Our data storage facilities are HIPAA compliant, and encrypted at-rest and in-transit, following industry-standard encryption protocols.

  • Data Retention Practices: Session notes can be manually deleted at any time or set to automatically delete after 30 days.

  • Responsible AI Usage: Our use of artificial intelligence is HIPAA compliant. Berries does not use Protected Health Information (PHI) to train its AI models.

  • Trusted Vendors: Our relevant vendors who process health information are HIPAA compliant and are carefully selected for their commitment to privacy and security, backed by BAAs. Our vendors include Google, Microsoft, Amazon, and Paubox. Each of these vendors is obligated to adhere to strict privacy and security protocols to protect PHI and PII in compliance with HIPAA regulations

Your privacy and security are central to us as we are dedicated to providing you with a safe and confidential experience while using our services.​

Last updated: January 8, 2025


For any further questions, feel free to reach out to us at [email protected]. We are here to help and honored to support you in your truly important work.

Did this answer your question?