Vendor management
Technology Stack and Vendor Management
Owkin's technology infrastructure combines proprietary in-house development with carefully selected partnerships. While we maintain direct control over much of our core technology, we collaborate with highly reputable vendors who must demonstrate alignment with our stringent privacy, security, and ethics standards.
Vendor Vetting and Due Diligence
Every potential partner undergoes rigorous evaluation before integration into our technology ecosystem. Our vetting process includes comprehensive security assessments and detailed due diligence reviews. Contractual agreements with all vendors incorporate strict requirements that mirror our own commitments to data protection and security, ensuring consistent safeguards across our entire stack.
Security and Privacy Framework
Data security is paramount in K Pro's design and operation. We implement robust organizational and technical measures to protect information at every stage, supported by regular internal and external audits. Major system changes trigger comprehensive Security Risk Assessments to proactively identify and address potential vulnerabilities.When integrating large language models or other third-party components, we exclusively select hosting configurations that guarantee privacy and confidentiality for all data inputs and outputs. This privacy-first architecture ensures full compliance with both GDPR and HIPAA requirements, providing robust protection for sensitive health and research data.
Certifications and Standards
Owkin's commitment to security and quality is validated through internationally recognized certifications:
ISO 27001:2022 for information security management
ISO 13485:2016 for medical device quality management
These certifications reflect our ongoing dedication to maintaining the highest standards of data protection and operational excellence throughout K Pro's lifecycle.
Last updated
Was this helpful?