technology & security
How Secure is Vital Records Online (VRO)?
We employ rigorous measures to provide an online form service with unparalleled security.

technology & security
We employ rigorous measures to provide an online form service with unparalleled security.

We are undergoing our SOC2 audit and anticipate achieving compliance by Q1 2025, reinforcing our commitment to data security and operational excellence.
Our commitment extends to complying with all relevant laws, including privacy and data protection regulations, upheld through various measures, practices, and policies.
Your personal information undergoes encryption to ensure secure transfer and storage of submission data. Employing high-grade RSA 2048 encryption at the user's end, followed by secure transfer and storage on our servers.
VRO ensures HIPAA compliance, ensuring
the highest security standards for handling HPI data, both digitally and physically.
Business Associate Agreements (BAAs) are available upon request for entities utilizing our services.
VRO adheres to PCI DSS Service Provider Level 1 standards, guaranteeing the highest security level for businesses handling payments and integrating with credit cards.
Our commitment extends to complying with all relevant laws, including privacy and data protection regulations, upheld through various measures, practices, and policies.
Users can restrict access and disable cloning, with submission access requiring login credentials, ensuring utmost data privacy.
We provide multiple options to protect forms from spammers, including limiting submissions per IP address or device and implementing form privacy settings to control access.
VRO maintains an uptime ratio of nearly 99.9%, ensuring uninterrupted access to your data. Our commitment at VRO is to uphold error response rates, resolution times, and uptime ratios synonymous with top-tier service providers.

Data Centers & Backup Policy/Business Continuity
VRO servers are housed within a cloud-based architecture provided by Amazon Web Services (AWS). With AWS boasting 25 Availability Zones within seven geographic Regions in North America, alongside 44 Edge Network locations and two Regional Edge Cache locations.

Encouraging Best Coding Practice
We prioritize implementing features that enhance security and maintain best practices on the backend to fortify the security of your account. Measures such as session monitoring and account isolation are in place to mitigate common attacks like SQL injection and cross-site scripting.

Security Audits
We conduct regular PCI scans to detect vulnerabilities in our publicly available interfaces, supplemented by internal and external Approved Scanning Vendor (ASV) tests. Periodic penetration tests further bolster our security posture.