Compliant Healthcare & Medical File Sharing

Robust Security
Safeguarding PHI through encryption and secure handling, protects data throughout the file transfer life-cycle.
Encryption In Transit
We use HTTPS TLS 1.2 for encrypted data transmission to and from all devices that connect to our cloud. This shields all data from interception during upload and download, ensuring confidentiality and integrity throughout the journey.
End-To-End Encryption
Files are encrypted on the senders device before the files are uploaded. They remain encypted on our servers, and when they are downloaded by the recipient. We cannot access the files, nor the encryption key, so it is vital that the encryption key be shared with the recipient.
Encryption At Rest
When end-to-end encryption is used, your files remain encrypted in our cloud until the pre-defined expiration date. We use AES‑256 bit encryption algorithms, a robust secure encryption standard, trusted worldwide for safeguarding sensitive health information.
Ensuring Privacy
We protect patient information by limiting access, ensuring only authorized users can access or handle protected health information (PHI).
Access Authentication: Use 2 factor authentication to verify login credentials thereby guaranteeing only permissible people can access their account.
Confidential Storage Space: At Filemail we don’t offer account-level share storage space. Every user has their own private storage space, and can only access the files shared with them specifically.
Controlled File Availability: All shared files can have a custom expiration date. Once this date passes, the files will no longer be available. You also have the option to delete the files before the expiration date.
Protected Download Pages: Define a custom password to add a layer of control and security. By using a custom user-defined password you ensure only individuals with the password can visit the download page.

Administrative Safeguards
Our security measures are in place to prevent data breaches, and if they do ever occur, we implement our data breach policy.
Periodic Security Evaluations
We undergo periodic evaluations by independent, third-party cybersecurity professionals. These reviews help us stay updated on the latest security practices. They also help us find potential weaknesses before they can be used against us.
Daily Updates
Cybersecurity threats are ever increasing, as is our defense posture. We update all anti-virus and malware definitions to provide up-to-date protection.
Breach Notification
We have established protocols that govern our response to data breaches. We promptly notify all affected customers and the relevant authorities within 72 hours of becoming aware of the breach.
File Sharing Transparency
Visibility and accountability are critical in regulated industries. Our tools give you insight into file sharing activity, so you know exactly where your data is and who has accessed it.
Administrative Control: As an administrator for the account you can assign privileges to the appropriate users, thereby controlling what they can and cannot do.
Audit logs: You have access to detailed logs detailing file sharing activity such as files uploaded, file downloaded, the time, approximate physical geo-location, and IP address of the downloader.
Integrity Checks: We generate an MD5 checksum before uploading a file and another upon completion of the transfer. The checksums are compared to validate successful file transfer without corruption.
Real-Time Notifications: We immediately send notifications when key file sharing events occur such as download . Alerts are sent via email. Optional SMS alerts are also available.

Physical Safeguards
We secure your data at the hardware and facility level to ensure complete protection, and HIPAA and GDPR compliance.

Region-Specific Storage
Our globally distributed cloud infrastructure ensures your files are stored in mandated geographic regions, such as the US, or the EU.

On-Premise Security
Our secure data centers are equipped with controlled facility access, security guards, entry systems, and continuous surveillance.
Securely Share Any File Type
Our platform supports all file types without restrictions. Send the specific files your workflow requires while maintaining full compliance.
Medical Imaging
- DICOM (.dcm): MRI, CT, PET, Ultrasound, X‑Ray
- JPEG2000 (.jp2): Compressed medical images
- TIFF (.tif): Pathology, dermatology
- MP4 / AVI: Ultrasound videos, surgical videos
Genomics & Research
- FASTQ / BAM / CRAM: Sequencing
- VCF : Variant call files
- HDF5: Bioinformatics datasets
Medical Documentation
- PDF: Scanned patient charts, pathology reports
- HL7 CDA / FHIR JSON/XML: Structured patient records

BAA Ready
We provide Business Associate Agreements (BAA) to all persons and entities in the health and medical domain, who require this industry recognized formal declaration.
Clients In The Health & Medical Domains








For Just / Month / User
Start Your Free Trial
Create your account or login