What we offer
Build your own imaging dataset on our self-serve platform
Work with us to curate real world data for your next research project
Redact PHI from medical imaging records
Explore our pre-packaged dataset of 1M+ studies
Who we work with
Pharma & Life Science
Tap into our network of longitudinal, tokenizable imaging records
AI & Medical Device
Accelerate your algorithm training and validation pipeline
Hospitals & Health Systems
Unlock the true value of your institution's data
Collaborations & Partnerships
Take a look at our partner network in the medical data space
Learn about our team and our origin story!
The Segmed team is growing - join us.
Security & Privacy
We're committed to protecting patient privacy. Here's how.
Industry news and curated content from the Segmed team
See what we're up to in the next few months!
Security & Privacy
At Segmed, our philosophy is that patient privacy and data security come first.
We apply our de-identification process while our data is being transferred to our servers. This means that no PHI should ever land in our servers.
Automatic PHI Removal
We use a combination of traditional and machine learning methods to remove PHI from DICOM headers and reports.
We routinely take random samples of data to check for proper de-identification.
Our platform follows HIPAA standards, and all team members participate in HIPAA training.
We want to embed security practices in all parts of our company. As part of our security measures, we have obtained our SOC 2 attestation and are working towards our ISO 27001 certification.
Secure by Design
We use cybersecurity scanners and detection systems to embed security in the platform as we build it, exceeding industry standards for security.
Segmed uses Amazon Web Services (AWS), the most secure global infrastructure monitored by world-class security experts, so you can feel confident in every stage in the process.
We automate as much of our data pipeline as possible to reduce the number of people interacting with sensitive data.
Policies and Protocols
HIPAA Anti-Retaliation Policy
Responsible Disclosure Policy
Stay in the loop:
Take a look at our
to learn more about our data de-identification workflow and procedures.
You can also learn more about how we're maintaining compliance and request access to our SOC 2 report through
our Vanta page
Accelerate your development pipeline.
Curate your training/validation datasets on Segmed Insight.
Subscribe to our monthly newsletter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security and Compliance
© All rights reserved.