Skip to content
Today's snapshot: 113,537 providers tracked
fonteum
ResearchToolsFonteumPricingCoverageMethodologyTrustAbout
DATA · MAY 8, 2026
Fonteum Trust Center · For procurement, journalists, and partners

Security, compliance, and data integrity practices for Fonteum.

Honest current state, not aspirational. We do not claim certifications we do not hold; we name the in-progress engagements with target dates. Five pillar pages below carry the deeper detail; the sub-processor list and breach-notification commitment further down reflect the actual stack today.

Security disclosures: security@fonteum.com · /.well-known/security.txt (RFC 9116)

Security questionnaire contact: security@fonteum.com · /contact

Privacy
GDPR + CCPA position, retention windows, sub-processor list, no-PII analytics posture.
Read more →
Compliance
SOC 2 Type 1 in progress (Sept 2026 target), HIPAA no-PHI attestation, BAA template.
Read more →
Reliability
Architecture portability, RTO < 4h, RPO < 24h, quarterly disaster-recovery drill schedule.
Read more →
Data integrity
Per-source license + redistribution posture, snapshot manifest, refresh cadence, methodology versioning.
Read more →
Data freshness
Live freshness status for the 6 canonical sources — current snapshot date, source release date, methodology version, and refresh cadence per source.
Read more →
Security
Vulnerability disclosure (RFC 9116), 24-hour breach notification, least-privilege access controls.
Read more →
01 · Data sources + licensing posture

What we hold and where it came from.

Every public field on every Fonteum surface is anchored on a registered public-record source — CMS NPPES, CMS PECOS, FL DBPR, CMS Care Compare, BLS OEWS, U.S. Census, HRSA HPSA. Each source carries an explicit redistribution license documented at /sources/[slug]; we do not republish data we do not have license to surface.

Restricted-distribution registries (state-bar membership rosters, NMLS Consumer Access, ABMS / CertiFacts) are explicitly excluded — see the §125 RESTRICTED_SOURCES list. We cite these sources publicly when relevant but never republish their rows.

Owner-claim flows collect only the fields needed to verify ownership and operate the claimed listing. Claims are never sold, leased, or syndicated to third parties.

02 · Retention policy

We hold what we need, for as long as it is useful.

Public-record source data: refreshed on the published cadence per source family (FL DBPR weekly, CMS NPPES monthly, CMS Care Compare quarterly). Previous snapshots are preserved to support change-record auditing.

Owner-claim records: held for the life of the claimed listing plus a 12-month tail after a claim is closed (sufficient to support corrections + complaint response). Operator-tooling logs follow the same window.

Analytics events (per §127): GA4 + PostHog retention follows the platform-default window. PII is never sent to either system; only PII-safe payload fields (data-source-slug, data-surface, data-vertical-slug).

03 · Access controls

Least-privilege by default.

Production database access is gated through Supabase row-level security (RLS) policies + a small operator-tooling allowlist. Public surfaces use the anonymous Supabase key with read-only access to RLS-permitted tables. Service-role keys are never shipped to the browser.

Operator-tooling access is restricted to the founder + named operators. Each operator authenticates per session; no shared credentials.

Source ingestion scripts (`scripts/sources/*`) run as service-role for write access during scheduled refreshes. Outputs are diffed against the previous snapshot before commit.

04 · Breach notification commitment

If something happens, we will say so.

If a confirmed unauthorized access to user data is discovered, we will notify affected users + post a public statement on /corrections-log within 72 hours of confirmation. The notification will name the scope of access, the affected data classes, the time window, and the remediation steps taken.

We have not had a breach to date. The policy exists so the threshold is documented, not tested.

05 · SOC 2 Type II

Planned. Not yet attested.

SOC 2 Type II attestation is on the roadmap but not yet held. We do not display a SOC 2 badge today. The target window for attestation will be set after the §157 A-tier vertical investments land and the company transitions from sprint mode to operations mode.

Buyers and procurement teams that need SOC 2 attestation today can request our security-questionnaire response from the contact below; we will answer with the actual posture, not aspirational claims.

06 · GDPR + CCPA position

Compliance-aware, not compliance-stamped.

Fonteum is a US-based research organization studying healthcare provider data drawn from federal public-record sources. Our public surfaces are accessible from EU + California addresses. We respond to GDPR data-subject-access-request (DSAR) requests + CCPA disclosure-and-deletion requests through the contact below, with the documented 30-day response window.

We do not sell personal data under either statute's definition. Provider-level public-record data is the published universe; consumer behavioral data is not collected, sold, or syndicated.

If an EU resident or California resident requests data deletion, we delete in-scope owner-claim records + analytics events within 30 days and confirm in writing.

07 · Sub-processors

Stack disclosed.

Fonteum runs on a small, intentionally common infrastructure stack. Each sub-processor is named below with its scope. The list is reviewed quarterly + when a new sub-processor is added.

  • Vercel — application hosting + edge network (US-East primary).
  • Supabase — managed Postgres + auth + storage. Row-level security enforced.
  • Anthropic / OpenAI — LLM inference for owner-tooling drafts; no consumer PII sent.
  • Sentry — error monitoring (server-side only; PII redacted before send).
  • Google Analytics 4 + PostHog — analytics. PII-safe payloads only (§127).
  • Resend — transactional email (claim sign-in links, owner notifications).
  • Stripe — payments for Featured / Pro tiers. PCI compliance handled by Stripe.
  • GitHub — source code + CI. Public commits, private secrets.
08 · Incident response

How we triage when something breaks.

Production incidents are triaged via a documented runbook: detect (Sentry + manual smoke), classify (P0 service-down vs P1 data-quality vs P2 cosmetic), respond (deploy fix or roll back), notify (status update on /corrections-log if user-visible), retro (within 5 business days for any P0 or P1).

Data-quality incidents (a wrong figure on a live page) follow the §164 corrections workflow + are logged at /corrections-log alongside doctrinal corrections.

09 · Security questionnaire contact

Procurement team needs answers? Ask.

Enterprise procurement reviews + security questionnaires (CAIQ, SIG, custom) route to security@fonteum.com or use /contact with the subject line 'Security questionnaire'. We respond within five business days with the actual posture, never aspirational claims.

If a buyer needs an MNDA executed before exchanging questionnaire detail, we can do that — request the template from the same contact.

This page describes our current security posture. We are not SOC 2 attested. We are committed to attestation by a timeline the founder will publish once §157 A-tier investments land. We do not display certification badges we do not hold.

See also
  • /methodology → Sourcing methodology, ingestion pipeline, change-detection process.
  • /editorial-policy → Source-tier definitions, source-disagreement resolution, displayed-vs-internal scope.
  • /sources → Per-source license, refresh cadence, fields used, and limitations.
  • /data-platform/schema → Public schema reference + provenance shape + change record.
  • /corrections-log → Public corrections register + how-to-submit form.
  • /contact → Security questionnaires, MNDA requests, DSAR + CCPA requests.

Compliance posture

We don’t sell ranking and don’t accept payment to move a provider up the list. For final hire decisions, verify licensing, insurance, and references directly with the applicable licensing or credentialing body.

No bulk-licensing source family is currently ingested for this vertical. Hire-time checking still routes through the body named above.

Methodology · Corrections log · Editorial policy

fonteum

Healthcare provider data, traced to source.


RESEARCH

  • Research hub
  • Data platform
  • For health-tech
  • Pricing
  • Press kit

NETWORK

  • Coverage
  • Healthcare graph

ABOUT

  • Mission
  • Methodology
  • Editorial policy
  • Corrections log
  • Security
  • SLA
  • Support
  • Refresh cadence
  • Terms
  • Contact

SUBSCRIBE

The monthly research digest. One email, first of each month. Unsubscribe anytime.


© 2026 FONTEUM RESEARCH · DATA SNAPSHOT MAY 8, 2026 · BUILT WITH CARE

  • X
  • LINKEDIN
  • PRESS