BAA/DPA Templates¶
Business Associate Agreements (BAAs) and Data Processing Agreements (DPAs) for VitaraVox's third-party integrations. These templates should be reviewed by legal counsel before execution.
1. Vapi.ai Data Processing Agreement¶
Parties¶
- Data Controller: [Clinic Name] (the "Clinic"), operating through VitaraVox platform
- Data Processor: Vapi Inc. ("Vapi"), provider of voice AI infrastructure
Definitions¶
- Personal Health Information (PHI): Any information about an identifiable individual relating to their physical or mental health, health care history, or health care payment, as defined under PIPEDA and PIPA
- Processing: Any operation performed on PHI, including collection, recording, storage, retrieval, transmission, and deletion
- Sub-processor: Any third party engaged by Vapi to process PHI (e.g., Telnyx for telephony, OpenAI for LLM inference)
Data Types Processed¶
| Data Type | Purpose | Retention |
|---|---|---|
| Voice recordings | Real-time transcription and intent detection | Per Vapi retention policy (request deletion) |
| Call transcripts | Appointment scheduling, patient identification | Controlled by VitaraVox (default 90 days) |
| Caller phone numbers | Patient identification, callback | Duration of call + metadata retention |
| Patient names | Spoken during call for identification | Embedded in transcript, subject to retention policy |
| Appointment details | Scheduling operations | Embedded in transcript and call logs |
Processor Obligations¶
- Purpose Limitation: Process PHI only for the purpose of providing voice AI services as instructed by the Controller
- Security Measures: Implement appropriate technical and organizational measures including:
- Encryption in transit (TLS 1.2+)
- Encryption at rest for stored recordings and transcripts
- Access controls limiting personnel access to PHI
- Regular security assessments
- Sub-processor Management:
- Maintain and disclose list of sub-processors
- Ensure sub-processors are bound by equivalent data protection obligations
- Notify Controller of any new sub-processors with 30 days notice
- Data Residency: Process and store data within [Canada / North America] unless otherwise agreed
- Breach Notification: Notify Controller within 24 hours of discovering a data breach involving PHI
- Data Deletion: Upon termination or request, delete all PHI within 30 days and provide written confirmation
- Audit Rights: Allow Controller or its designated auditor to conduct compliance audits with reasonable notice
Controller Obligations¶
- Ensure lawful basis for processing (caller consent via recorded greeting)
- Provide clear instructions to Processor regarding data handling
- Notify Processor of any data subject requests (access, deletion)
Term and Termination¶
- Agreement effective for duration of service subscription
- Either party may terminate with 90 days written notice
- Processor must delete all PHI within 30 days of termination
- Survival: Confidentiality and data protection obligations survive termination
2. Hosting Provider DPA (Oracle Cloud Infrastructure — OCI Toronto)¶
Parties¶
- Data Controller: VitaraVox Inc. (the "Company")
- Data Processor: Oracle Corporation ("Oracle"), provider of cloud infrastructure
Definitions¶
Same as Section 1, with additions:
- Infrastructure Services: Compute, storage, networking, and database services provided by Oracle
- Customer Data: All data uploaded, stored, or processed on Oracle infrastructure by the Company
Data Types Processed¶
| Data Type | Purpose | Storage Location |
|---|---|---|
| PostgreSQL database | Clinic configs, call logs, user accounts | OCI Toronto (ca-toronto-1) |
| Application logs | Debugging, audit trail | OCI Toronto (ca-toronto-1) |
| Database backups | Disaster recovery | OCI Toronto (ca-toronto-1) |
| TLS certificates | Transport encryption | OCI Toronto (ca-toronto-1) |
Processor Obligations¶
- Data Residency: All Customer Data remains within OCI Toronto region (ca-toronto-1) unless explicitly requested
- Physical Security: Maintain SOC 2 Type II certified data centers with:
- 24/7 physical access controls
- Environmental controls (fire suppression, climate control)
- Redundant power and networking
- Logical Security:
- Network isolation (VCN, security lists, NSGs)
- Encryption at rest (AES-256) for all block and object storage
- Encryption in transit for all inter-service communication
- Access Controls:
- No Oracle personnel access to Customer Data without explicit authorization
- Privileged access management for infrastructure operations
- Breach Notification: Notify Company within 24 hours of confirmed security incident
- Compliance: Maintain SOC 2 Type II, ISO 27001, and CSA STAR certifications
- Data Deletion: Upon service termination, securely erase Customer Data within 90 days
Controller Obligations¶
- Configure appropriate security groups and access policies
- Manage encryption keys (OCI Vault recommended)
- Monitor and respond to security alerts
Term and Termination¶
- Coterminous with OCI service agreement
- Data export available via standard OCI tools during termination period
- Oracle deletes Customer Data 90 days after termination
3. OSCAR Bridge DPA (Internal Service Agreement)¶
Parties¶
- Data Controller: VitaraVox Inc. (the "Company")
- Data Processor: VitaraVox Inc. — OSCAR REST Bridge Service (internal)
Purpose¶
This is a simplified internal agreement documenting data handling practices for the OSCAR REST Bridge, which operates as an internal microservice within the same infrastructure.
Data Types Processed¶
| Data Type | Purpose | Retention |
|---|---|---|
| Patient demographics | Search, registration, retrieval | Pass-through only (not stored) |
| Appointment data | Booking, rescheduling, cancellation | Pass-through only (not stored) |
| Provider information | Availability lookup, provider listing | Pass-through only (not stored) |
| API request logs | Debugging, audit | 14 days (structured logs) |
Security Controls¶
- Network Isolation: Bridge runs in Docker container on same host, accessible only via internal Docker network
- Authentication: X-API-Key header required for all requests (256-bit CSPRNG key)
- No Data Storage: Bridge is stateless — all PHI passes through to OSCAR and is not persisted
- Transport Security: Internal Docker network (no external exposure); external access via reverse proxy with TLS
- Rate Limiting: 100 requests/minute per IP
- Input Validation: All inputs validated before forwarding to OSCAR
Logging Policy¶
- Request metadata logged (timestamp, method, path, response code, latency)
- Request/response bodies NOT logged in production
- Patient identifiers NOT logged (demographic IDs redacted)
- Logs retained for 14 days, then automatically rotated
Incident Response¶
- Same as Company breach notification plan
- Bridge errors escalated to platform operations team
- OSCAR connectivity issues trigger circuit breaker (automatic recovery)
Template Usage Notes¶
Legal Review Required
These templates are starting points and must be reviewed by qualified legal counsel before execution. Privacy law requirements vary by jurisdiction and may change.
Execution Checklist
- Review templates with legal counsel
- Customize for specific clinic and jurisdiction
- Send to counterparty for negotiation
- Execute signed copies
- Update
ClinicConfigBAA tracking fields in admin dashboard - Store signed copies securely (encrypted storage)
- Set calendar reminder for annual review