Privacy Policy
Effective Date: November 1, 2025
Last Updated: October 31, 2025
1. Introduction
Vivologix (“we,” “us,” or “our”) is committed to protecting the privacy and security of personal information. This Privacy Policy explains how we collect, use, disclose, and safeguard information in compliance with:
- Personal Information Protection and Electronic Documents Act (PIPEDA)
- Personal Health Information Protection Act, 2004 (PHIPA) of Ontario
- Freedom of Information and Protection of Privacy Act (FIPPA) where applicable
- Other applicable Canadian federal and provincial privacy legislation
This Policy applies to:
- Visitors to our website (www.vivologix.com)
- Clients engaging our services
- Individuals whose information we process on behalf of clients
- Business contacts and partners
2. Who We Are
Business Name: Vivologix
Location: Ontario, Canada
Nature of Business: Healthcare data analytics, AI-powered health analytics, and research consulting services
Contact: hello@vivologix.com
Privacy Officer: Dr. Urooj Fatima
Contact for Privacy Matters: hello@vivologix.com
3. Information We Collect
3.1 Information Collected Directly From You
Contact and Business Information:
- Name, title, and organization
- Email address, phone number, and mailing address
- Professional credentials and affiliations
- Communication preferences
Website and Service Inquiry Information:
- Information submitted through contact forms
- Project requirements and consultation requests
- Appointment scheduling information
- Newsletter subscription preferences
Client Engagement Information:
- Service agreements and contracts
- Project specifications and requirements
- Billing and payment information
- Correspondence and communications
3.2 Information We Process on Behalf of Clients
When providing services, we may process various types of data as a service provider, including:
Personal Health Information (PHI):
- Patient demographics (age, gender, location)
- Medical diagnoses and procedures
- Laboratory and test results
- Clinical notes and reports
- Treatment histories
- Health outcomes data
- Prescription and medication information
De-identified or Anonymized Data:
- Aggregated health statistics
- Population health metrics
- Research datasets with identifiers removed
Administrative Health Data:
- Healthcare utilization records
- Insurance and billing information
- Hospital admission and discharge records
Note: When processing PHI, we act as a “health information network provider” or “agent” under PHIPA, or as a “processor” under PIPEDA, depending on the context. Our clients (as “health information custodians” or “controllers”) remain responsible for compliance with consent and legal authority requirements.
3.3 Information Collected Automatically
Website Usage Information:
- IP addresses and device identifiers
- Browser type and version
- Pages visited and time spent
- Referral sources
- Cookies and similar technologies
System and Security Logs:
- Access logs for security monitoring
- Authentication attempts
- System performance metrics
- Error logs
4. Legal Basis and Purposes for Processing
4.1 Business Contact Information
Legal Basis: Legitimate business interests (PIPEDA Section 7(1)(b))
Purposes:
- Responding to inquiries and consultation requests
- Providing information about our services
- Managing client relationships
- Sending newsletters (with consent)
- Business communications
4.2 Client Engagement Data
Legal Basis: Contractual necessity and legitimate interests
Purposes:
- Executing service agreements
- Delivering contracted services
- Invoicing and payment processing
- Project management and communication
- Quality assurance and improvement
- Legal compliance and dispute resolution
4.3 Personal Health Information
Legal Basis: Processing on behalf of clients who have the legal authority (consent, legislation, or other lawful basis under PHIPA/PIPEDA)
Purposes (as specified by clients):
- Healthcare data analysis and reporting
- Clinical research and studies
- Public health surveillance
- Quality improvement initiatives
- Health services evaluation
- Predictive modeling and AI development
- Systematic reviews and evidence synthesis
- Real-world evidence generation
Important: We only process PHI under written agreements with clients who confirm they have the legal authority to disclose such information to us.
4.4 Website Analytics
Legal Basis: Legitimate interests with opt-out mechanisms
Purposes:
- Website performance optimization
- Understanding user behavior
- Improving user experience
- Security monitoring
5. How We Use Information
5.1 Primary Uses
Service Delivery:
- Performing data analysis, AI modeling, and research services
- Creating deliverables (reports, dashboards, models)
- Providing consultation and recommendations
- Communicating project updates and findings
Business Operations:
- Managing client relationships
- Processing payments and maintaining records
- Internal quality assurance
- Staff training (using anonymized examples)
- Business analytics and planning
Legal and Compliance:
- Meeting regulatory requirements
- Responding to legal processes
- Enforcing our terms and conditions
- Protecting our rights and those of others
5.2 Secondary Uses
We may use de-identified or aggregated data for:
- Developing and improving analytical methodologies
- Training AI models and algorithms (non-PHI only)
- Publishing research findings (with appropriate anonymization)
- Industry benchmarking and reports
- Marketing and promotional materials (in anonymized, aggregate form)
Important: Any secondary use of PHI requires explicit authorization from clients and, where required, from individual data subjects.
6. Information Sharing and Disclosure
6.1 We Do NOT Sell Personal Information
We never sell, rent, or trade personal information or personal health information to third parties.
6.2 Sharing with Service Providers
We may share information with trusted service providers who assist us, including:
Cloud Infrastructure Providers:
- AWS, Microsoft Azure, or Google Cloud (Canadian regions where possible)
- Subject to strict data processing agreements
- SOC 2 Type II certified providers
Software and Tools:
- Project management and collaboration platforms
- Secure file transfer services
- Analytics and visualization tools
- Communication platforms
Professional Services:
- Legal counsel (subject to solicitor-client privilege)
- Accounting and financial services
- IT security consultants
All service providers:
- Are contractually required to protect information
- May only use information for specified purposes
- Must comply with Canadian privacy laws
- Are subject to regular security assessments
6.3 Sharing with Clients
We share findings, analyses, and deliverables with the clients who engaged us, as specified in service agreements.
6.4 Legal Disclosures
We may disclose information when required by law:
- Court orders or subpoenas
- Legal proceedings or investigations
- Regulatory compliance requirements
- Public health emergencies (as required by legislation)
- To protect health or safety in urgent circumstances
We will notify affected parties unless prohibited by law.
6.5 Business Transactions
If Vivologix is involved in a merger, acquisition, or sale of assets, information may be transferred. Affected parties will be notified, and information will remain subject to privacy protections.
6.6 With Your Consent
We may share information in other circumstances with your explicit consent.
7. Data Security Measures
We implement comprehensive safeguards to protect information from unauthorized access, use, disclosure, modification, or destruction.
7.1 Technical Security Measures
Encryption:
- TLS 1.3 or higher for all data in transit
- AES-256 encryption for data at rest
- End-to-end encryption for file transfers
- Encrypted email for sensitive communications (when supported)
Access Controls:
- Multi-factor authentication (MFA) for all system access
- Role-based access control (RBAC) – minimum necessary access
- Unique user accounts – no shared credentials
- Automatic session timeouts
- Regular access rights reviews
Network Security:
- Firewalls and intrusion detection/prevention systems
- Virtual private networks (VPNs) for remote access
- Network segmentation and isolation
- Regular vulnerability scanning
- Penetration testing (annually)
Endpoint Security:
- Full disk encryption on all work devices
- Antivirus and anti-malware software
- Mobile device management (MDM) for mobile devices
- Automatic security patch management
- Remote wipe capability for lost/stolen devices
Data Protection:
- Automated encrypted backups (daily)
- Geographic redundancy for critical data
- Backup integrity testing
- Secure data deletion protocols (NIST 800-88 standards)
- Data loss prevention (DLP) tools
Application Security:
- Secure software development lifecycle
- Regular security code reviews
- Dependency vulnerability monitoring
- Input validation and sanitization
- SQL injection and XSS prevention
7.2 Administrative Security Measures
Personnel Security:
- Background checks for all employees
- Signed confidentiality and non-disclosure agreements
- Privacy and security training (upon hiring and annually)
- Clear acceptable use policies
- Defined security roles and responsibilities
Policies and Procedures:
- Documented information security policy
- Data classification and handling procedures
- Incident response and breach notification plans
- Business continuity and disaster recovery plans
- Secure disposal and destruction procedures
- Vendor management and assessment procedures
Oversight and Monitoring:
- Security incident logging and monitoring
- Regular security audits and assessments
- Privacy impact assessments for new projects
- Continuous compliance monitoring
- Third-party security audits (annually)
Access Management:
- Formal onboarding and offboarding procedures
- Immediate access revocation upon termination
- Regular access recertification
- Privileged access management
- Audit trails for all data access
7.3 Physical Security Measures
Data Center Security:
- Use of certified data centers (SOC 2, ISO 27001)
- 24/7 physical security and monitoring
- Biometric or card-based access controls
- Environmental controls (fire suppression, climate control)
- Redundant power and network connectivity
Office Security:
- Secure office facilities with controlled access
- Locked storage for physical documents
- Clean desk policy
- Visitor management procedures
- Secure destruction of physical materials (cross-cut shredding)
Device Security:
- Cable locks for portable devices
- Privacy screens for laptops
- Secure storage when not in use
- Prohibition of unencrypted USB drives
- Mobile device security policies
7.4 Client-Side Security Requirements
We require clients to:
Data Transmission:
- Use our secure file transfer portal or encrypted email
- Never send unencrypted PHI via regular email
- Verify recipient before sending sensitive data
- Use strong passwords for shared access
Access Credentials:
- Maintain confidentiality of passwords and access credentials
- Not share login credentials
- Report suspected compromises immediately
- Use secure methods for credential sharing
Incident Reporting:
- Report suspected security incidents within 24 hours
- Cooperate with incident investigations
- Maintain their own incident response procedures
7.5 Ongoing Security Improvements
We continuously enhance security through:
- Monitoring emerging threats and vulnerabilities
- Adopting new security technologies and best practices
- Participating in healthcare security communities
- Regular security awareness training updates
- Lessons learned from incident reviews
8. Data Retention and Disposal
8.1 Retention Periods
Business Contact Information:
- Retained while relationship is active and for 7 years after last contact
- Newsletter subscribers until unsubscribe requested
Client Engagement Records:
- Service agreements and contracts: 7 years after project completion
- Financial records: 7 years per CRA requirements
- Project communications: Duration of project plus 1 year
Personal Health Information:
- Retained only as long as necessary to complete services
- Default: 90 days after project completion and final deliverable delivery
- Extended retention only with explicit client authorization
- Minimum retention may be required by research ethics boards or regulations
De-identified Data:
- May be retained indefinitely for methodology development and quality improvement
- No re-identification attempted or possible
Website Logs:
- Access logs: 90 days
- Security logs: 1 year
8.2 Secure Disposal
When information is no longer needed:
Digital Data:
- Cryptographic erasure (encryption key destruction)
- NIST 800-88 compliant secure deletion
- Physical destruction of storage media when decommissioned
- Certificates of destruction available upon request
Physical Records:
- Cross-cut shredding or secure disposal service
- Documented destruction for sensitive materials
Backup Data:
- Removed from backup systems within 90 days of scheduled deletion
- Encrypted backups remain encrypted until purged
8.3 Client-Requested Deletion
Clients may request early deletion of their data:
- Requests processed within 30 days
- Confirmation provided upon completion
- Exceptions: Legal holds, regulatory requirements, or dispute-related data
9. International Data Transfers
9.1 Primary Data Location
We prioritize storing data within Canada:
- Canadian data centers used when possible
- Cloud services configured for Canadian regions
9.2 Cross-Border Transfers
When data may be transferred outside Canada:
- Only to jurisdictions with adequate privacy protections
- Under contractual protections (Standard Contractual Clauses)
- With client knowledge and consent
- Primarily: United States (for certain cloud services)
Important for PHI: Cross-border transfers of PHI are minimized and occur only when:
- Necessary for service delivery
- Authorized by the client
- Subject to contractual safeguards
- In compliance with PHIPA requirements
Clients are informed of data locations in service agreements.
10. Your Privacy Rights
10.1 Rights Under PIPEDA and PHIPA
Access: You have the right to request access to your personal information we hold.
Correction: You may request correction of inaccurate or incomplete information.
Withdrawal of Consent: Where processing is based on consent, you may withdraw consent (subject to legal or contractual restrictions).
Information About Use and Disclosure: You may request information about how your information has been used and disclosed.
File a Complaint: You may file a complaint with our Privacy Officer or with regulatory authorities.
10.2 How to Exercise Rights
For Business Contacts:
- Email: hello@vivologix.com
- Subject line: “Privacy Rights Request”
- We will respond within 30 days
For Individuals Whose Data We Process on Behalf of Clients:
- Contact the organization that originally collected your information (our client)
- They will coordinate with us as necessary
- If you contact us directly, we will refer you to the appropriate organization
10.3 Verification
To protect your privacy, we verify identity before fulfilling requests:
- May require government-issued ID or other verification
- May ask security questions
- May contact you at registered contact information
10.4 Fees
Access requests are generally free. However, we may charge reasonable fees for:
- Extensive requests requiring significant resources
- Requests for copies of large volumes of information
- Repeated requests for the same information
Fees will be disclosed before processing requests.
10.5 Limitations on Rights
Rights may be limited when:
- Disclosure would reveal confidential commercial information
- Information is subject to solicitor-client privilege
- Disclosure would compromise security or investigations
- Information cannot be separated from information about others
- Required or permitted by law
We will explain any limitations and inform you of your right to complain to regulators.
11. Cookies and Website Technologies
11.1 What We Use
Essential Cookies:
- Session management
- Security features
- Load balancing
Analytics Cookies:
- Google Analytics (IP anonymization enabled)
- Website performance monitoring
- User behavior analysis
Functional Cookies:
- Language preferences
- Form auto-fill assistance
11.2 Your Choices
Browser Controls:
- Configure browser to refuse cookies
- Delete cookies already stored
- Receive notifications when cookies are set
Opt-Out Tools:
- Google Analytics opt-out: https://tools.google.com/dlpage/gaoptout
Impact of Refusing Cookies:
- Essential cookies: Website may not function properly
- Analytics cookies: No impact on functionality
11.3 Do Not Track
Our website does not currently respond to Do Not Track signals, as there is no industry standard for how to respond.
12. Third-Party Links
Our website may contain links to third-party websites. We are not responsible for the privacy practices of external sites. We encourage you to review their privacy policies.
13. Children’s Privacy
Our services are not directed to individuals under 18. We do not knowingly collect personal information from children. If we learn we have collected information from a child, we will delete it promptly.
Note: When processing health data, age restrictions do not apply as we process data on behalf of healthcare organizations with appropriate legal authority.
14. Privacy Breach Notification
14.1 Our Obligations
If a privacy breach occurs involving a real risk of significant harm:
To Affected Individuals:
- Notification as soon as feasible
- Description of the breach
- Steps being taken
- Mitigation recommendations
- Contact information for inquiries
To Regulators:
- Notification to the Privacy Commissioner of Canada (if PIPEDA applies)
- Notification to the Information and Privacy Commissioner of Ontario (if PHIPA applies)
- Notification to other regulators as required
To Clients:
- Immediate notification if client data affected
- Details sufficient for client to meet their own notification obligations
14.2 What We Include
Breach notifications contain:
- Date and nature of breach
- Personal information involved
- What we’re doing to mitigate
- What you can do to protect yourself
- Our contact information
14.3 Breach Prevention
We maintain:
- Incident response plan (tested annually)
- Breach investigation procedures
- Root cause analysis processes
- Corrective action tracking
- Lessons learned documentation
15. Updates to This Policy
15.1 Change Notification
We may update this Privacy Policy periodically:
- Material changes: 30 days’ advance notice via email and website
- Non-material changes: Notification on website
- Effective date updated at top of policy
15.2 Continued Use
Continued use of our services after changes take effect constitutes acceptance. If you do not agree, please discontinue use and contact us to discuss.
15.3 Client Notification
For service contracts, material privacy changes require:
- Direct written notification to clients
- Opportunity to review and discuss
- Right to terminate if changes are unacceptable
16. Contact Us
16.1 Privacy Officer
Name: Dr. Urooj Fatima
Email: hello@vivologix.com
Address: Ontario, Canada
16.2 General Inquiries
For questions about this Privacy Policy or our privacy practices:
- Email: hello@vivologix.com
- Response Time: Within 5 business days
16.3 Privacy Complaints
If you believe we have not complied with privacy obligations:
Step 1: Contact our Privacy Officer (contact above)
- We will acknowledge receipt within 5 business days
- We will investigate and respond within 30 days
Step 2: If unsatisfied with our response, you may file complaints with:
Privacy Commissioner of Canada (PIPEDA):
- Website: www.priv.gc.ca
- Toll-free: 1-800-282-1376
- Email: info@priv.gc.ca
Information and Privacy Commissioner of Ontario (PHIPA/FIPPA):
- Website: www.ipc.on.ca
- Phone: 416-326-3333 / 1-800-387-0073
- Email: info@ipc.on.ca
17. Definitions
Personal Information: Information about an identifiable individual, as defined by PIPEDA.
Personal Health Information: Identifying information about an individual relating to their health, as defined by PHIPA.
Health Information Custodian: Organizations with legal obligations to protect health information under PHIPA (typically our clients).
Agent: A person or entity that processes PHI on behalf of a health information custodian (our role in many projects).
De-identification: Removal of identifying information such that a reasonable person would not expect the information could identify an individual.
Anonymization: Irreversible de-identification such that re-identification is not possible.
Last Reviewed: October 31, 2025
Acknowledgment: By using our services or website, you acknowledge that you have read and understood this Privacy Policy.
