Trust Center

Security Overview – iGlowly Assistant

Last updated: 30 March 2026

1. Security Approach

The iGlowly Assistant is designed according to privacy-by-design, data minimization, and least-privilege principles.
The system architecture is specifically designed to avoid storing personal data and Protected Health Information (PHI), and to reduce security risk by minimizing stored data.

Security measures include encryption, access control, data isolation, secure infrastructure providers, and abuse prevention mechanisms.

2. Infrastructure Security

The iGlowly Assistant is built using established cloud providers with industry-standard security practices:

These providers maintain their own security certifications and infrastructure protections, including physical security, network security, and infrastructure monitoring.

iGlowly does not operate its own physical servers.

3. Encryption

Data in Transit

Data at Rest

4. Access Control and Authentication

Access to systems and data is restricted according to the principle of least privilege.

5. Data Isolation

The system is designed to ensure logical isolation between clinics.

6. No Storage of Chat Messages

To reduce privacy and security risk, the iGlowly Assistant is designed so that chat messages are not stored.

This significantly reduces the risk associated with data breaches because conversation content is not stored.

7. Personal Data Protection and Sanitisation

If users enter personal data in chat messages, the system applies automated detection and redaction before AI processing.

Sanitisation includes:

This process is designed to prevent personal data from being transmitted to AI providers.

8. Logging Policy

The system is designed to avoid logging sensitive content.

9. Backup Policy

Backups are performed for system and database integrity.

10. Session Security

The Assistant uses temporary session tokens to maintain conversation state.

11. Abuse Prevention and Rate Limiting

To protect the system from abuse and automated attacks:

12. Subprocessors and Data Locations

iGlowly uses a limited number of subprocessors to operate the Assistant. These include infrastructure hosting, AI processing, and script delivery providers.

Data hosting and processing locations include:

See the Subprocessors page for the full and up-to-date list of subprocessors.

13. Incident Response

If a security incident is detected, iGlowly will:

14. Summary

The security model of the iGlowly Assistant is based on the following principles:

This approach reduces the risk associated with handling sensitive data and helps protect both clinics and users.

copyright @2026 iGlowly.com /  iGlowly Assistant Trust
We respect your privacy – iGlowly does not collect cookies or tracking data.
Privacy / legal notices /hello@iglowly.com
RBSPSRIZIV/INAMIPubMedPMC EuropePMC
Data sourced from public and professional medical resources. No affiliation or endorsement.