NHS DTAC 2.0 — Security
Version 1.0 — Effective 6 April 2026 — Clarifia Ltd
Clarifia holds Cyber Essentials Plus certification, assessed by an IASME-accredited certifying body. CE+ requires independent technical verification of all five control categories, going beyond the self-assessment of standard Cyber Essentials. Our certificate is available to NHS deploying organisations on request.
All systems accessible from the internet are protected by correctly configured boundary firewalls and network devices.
Computers and network devices are configured to reduce the level of inherent vulnerabilities.
User accounts and special access privileges are controlled and kept to a minimum.
Malicious software is prevented from installing or running on devices.
Software running on computers and network devices is kept up to date.
All data stored by Clarifia is encrypted at rest using AES-256-GCM (Advanced Encryption Standard, 256-bit key, Galois/Counter Mode). This algorithm provides both confidentiality and authenticated encryption (integrity verification), preventing silent data corruption or tampering.
AES-256-GCM provides authenticated encryption: the GCM authentication tag cryptographically binds the ciphertext to the AAD (Additional Authenticated Data), which includes the record’s FHIR resource ID, the authoring clinician’s pseudonymised UUID, and the creation timestamp. Any post-write modification of either the data or the metadata invalidates the authentication tag — tampering is detectable.
Combined with the FHIR AuditEvent trail (written to an append-only log stream with its own independent AES-256-GCM encryption key), Clarifia’s clinical records satisfy the three conditions of non-repudiation required by DCB0129 §7:
All data in transit is protected using TLS 1.3 as the minimum protocol version. TLS 1.0 and 1.1 are explicitly disabled. TLS 1.2 is permitted only for legacy NHS system integrations where TLS 1.3 is not yet supported, with a documented exception and review date.
max-age=63072000; includeSubDomains; preload — ensures browsers always use HTTPS for subsequent connectionsClarifia has completed the NHS England Data Security and Protection Toolkit (DSPT) 2025/26 submission. Our status is Standards Met, confirmed against all 10 NDG Data Security Standards.
| NDG Standard | Description | Status |
|---|---|---|
| 1 | Personal confidential data is only accessible to staff who need it | Met |
| 2 | Staff understand their responsibilities and are supported to act on them | Met |
| 3 | Data is stored securely and used appropriately | Met |
| 4 | Unsolicited approaches concerning personal confidential data are handled appropriately | Met |
| 5 | Hardware and software assets are properly controlled | Met |
| 6 | Technology is kept up to date and resilient | Met |
| 7 | Data is protected from cyber attack | Met |
| 8 | Staff are accountable for their use of data | Met |
| 9 | Data controllers ensure data is handled appropriately | Met |
| 10 | Data is only shared lawfully and with appropriate technical controls | Met |
Clarifia operates a strict Zero-PII logging policy. Application logs, error traces, and infrastructure metrics contain no patient-identifiable information. Specifically:
We operate a responsible disclosure programme. If you believe you have found a security vulnerability in Clarifia, please report it to:
Email: governance@clarifia.ai
PGP Key: Available on request
Response SLA: Acknowledgement within 24 hours; triage within 72 hours.
We commit not to pursue legal action against researchers who report vulnerabilities in good faith and in accordance with this policy.