Go to navigation Open search Go to content Go to footer

Product Safety Guaranteed

IT security and data protection at the hospital

ConnectedCare IT-Sicherheit und Datenschutz | Schlosssymbol mit Netzgrafik vor Binärcode.

Our Top Priority

Secure patient data with ConnectedCare

For us, the security of patient and health data is not a matter of prioritization. This is why the highest data protection and maximum IT security form the basis of our software. We ensure digital health services that meet all the internal and external security requirements of a hospital.

lokale Datensicherung: Bildschirm mit Ordner und blauem Standortzeichen

Local data storage

Patient data is stored in the hospital exclusively

Sichere Patientendaten: Schloss mit Person und blauem Haken


Data is processed in compliance with legal provisions

Blaue Rosette mit Haken

100% in Germany

Data is processed and stored on servers in Germany

minimale Datenhaltung: Patientenakte mit minimierenden Pfeilen

Minimal data storage

Thanks to direct communication between patients and service providers

Our Mission

Information security for hospitals and patients

As a software provider for hospitals, we process sensitive patient data. This is why data protection and information security take top priority in the development of ConnectedCare. Our security and compliance teams are constantly working on protecting the software and continuously developing the security measures.

ISO standards, BSI standards, and B3S for hospitals

The technologies we use are based exclusively upon official certifications (e.g. ISO 27001) that are recognized worldwide as well as recommendations from official institutions such as the BSI (German Federal Office for Information Security).

  • Information security management compliant with ISO 27001
  • Based upon BSI standards 200-1, 200-2, 200-3 
  • BSI TR-02102 Cryptographic Mechanisms 
  • B3S standard for KRITIS (here: hospitals)

Always state-of-the-art: Security and data protection out-of-the-box

Maximum security is the default setting for ConnectedCare solutions. The design of the software architecture considers the following paradigms:

  • security-by-design
  • privacy-by-design
  • privacy-by-default

On the safe side – with pen tests and the latest technology

To provide optimum protection, we use only state-of-the-art technology during development. It starts with the selection of service providers, e.g. OpenID Connect for secure authentication, and ends with external weak point analyses by means of pen tests.


Get in touch with us

How to contact us

Get in touch with us!

Would you like to learn more about data protection and the IT security of the ConnectedCare software? Contact our experts directly.

ConnectedCare, Tobias Mayer, Security Expert

Dr. Tobias Mayer

Security Expert