Your business data is in safe hands with Cliniko
We make sure your information is secure so that you can sleep easy.
Ultra Secure Facilities
Cliniko is hosted in state of the art datacenter facilities. Physical access is controlled both at the perimeter and at building ingress points by professional security staff utilising video surveillance, intrusion detection systems, and other electronic means.
Two Factor Authentication
Two factor authentication adds an extra layer of security to Cliniko so you require not only your password, but also a log-in code generated on your smartphone to access your account. Put simply, enabling two factor authentication is the single best thing you can do to improve the security of your Cliniko account.
We use datacenter facilities that are built in clusters in various global regions. In case of failure, automated processes move customer data traffic away from the affected area and into other sites. We are very open about our uptime, you can see all the details at our System Status page.
Accreditations and Certifications
We choose our partners carefully. Our hosting partner has achieved the following accreditations and certifications; PCI DSS Level 1 (Payment Card Industry Data Security Standard), ISO 27001 (Information Security Management System), FIPS 140-2 (United States Federal Information Processing Standard).
Cliniko is monitored 24 hour a day, 7 days a week, 365 days a year. If something goes wrong, we will be the first to know about it and will have technicians working to fix the problem immediately, no matter when it occurs.
Cliniko runs completely under HTTPS. This means your data is encrypted during transfer using a 2048-bit SSL certificate.
Our database and file attachments are encrypted at rest, using the industry standard AES-256 encryption algorithm.
Our team has the minimal required level of access to customer information in order to maintain our systems and to assist you appropriately.
Cliniko data is backed up daily. Backups are redundantly stored in multiple physical locations.
Want more information?
If you have any specific questions or require further information, please contact us.
Are you a security researcher?
We offer bug bounties for new, responsibly disclosed issues. If you've found something, please contact us at email@example.com.