About Us

At Actinode, we're a team of tech enthusiasts dedicated to transforming ideas into innovative solutions. With a strong foundation in technology and creativity, we bring together expertise from various domains to deliver exceptional results. Our mission is to turn your visions into reality through cutting-edge technology and a collaborative approach. Meet the passionate professionals behind Actinode – committed to driving innovation and creating impactful solutions for your business.

Healthcare Technology

Telehealth MVP: HIPAA-Ready Architecture Shipped in 6 Weeks

Designed and shipped a production telehealth platform with secure video consultation, PHI management, and HIPAA-aligned architecture in a single 6-week sprint — enabling the client to launch and begin signing clinic contracts immediately.

Q1 2026
Digital Health Start-up
6 weeks
4 Engineers (2 Full-Stack, 1 Cloud/Security, 1 QA)

Overview

Designed and shipped a production telehealth platform with secure video consultation, PHI management, and HIPAA-aligned architecture in a single 6-week sprint — enabling the client to launch and begin signing clinic contracts immediately.

Industry

Healthcare

Offering

MVP Development with Compliance-Ready Architecture

Business Challenges

A digital health start-up had secured pilot agreements with two GP clinics and a small specialist network, contingent on demonstrating a working, secure telehealth product. Their existing prototype was a proof-of-concept with no security controls, no PHI boundary definition, and no audit logging — unsuitable for clinical use.

Key Pressures:

  • Time constraint: Pilot launch window was fixed at 6 weeks; missing it would lose both clinic relationships
  • Compliance unknown: Founding team had no experience with HIPAA or NHS Digital security standards; did not know what "HIPAA-ready" required in practice
  • Data sensitivity: Platform would handle appointment records, video sessions, prescriptions, and patient identifiers — all constituting PHI
  • Budget ceiling: Pre-seed stage meant infrastructure and third-party service costs had to be kept minimal without compromising compliance
  • No internal engineering team: The founding team were clinicians and a product manager — all engineering would be contracted

Business Requirements

The client needed a deployable telehealth MVP that satisfied the following constraints:

  • HIPAA Security Rule compliance for all PHI at rest and in transit
  • Secure video consultation with no third-party video provider receiving unencrypted patient data
  • Appointment scheduling integrated with GP clinic calendar systems
  • Patient records — basic encounter notes, prescription records, and visit history accessible by treating clinicians only
  • Audit logging for all PHI access, sufficient to satisfy a basic compliance review
  • Clinician and patient roles with appropriate access boundaries
  • Business Associate Agreements (BAAs) in place with all infrastructure providers before go-live
  • Documented security controls to share with clinic compliance reviewers

Key Results

42 daysKick-off to live clinical use
ZeroPHI findings at launch review
2 clinicsPilot agreements activated
100%MFA adoption — clinicians
100%PHI audit log coverage
6 weeksMVP to production timeline

The Challenge

The technical challenge was designing a system that met HIPAA's Security Rule requirements without overbuilding — the client needed a compliant MVP, not an enterprise EHR.

PHI Boundary Mapping:

The first task was defining exactly which data was PHI and which systems would touch it. This produced a clear boundary: the core API, the database, and video session metadata were in scope. Static assets, the public marketing site, and the analytics layer were outside the boundary.

Video Architecture:

Free-tier video APIs (Twilio Video, Agora) required sending session metadata to third-party servers, creating BAA complexity and data sovereignty questions. The decision was to use WebRTC peer-to-peer sessions via a self-hosted TURN/STUN server (coturn on a private EC2 instance), keeping all session routing infrastructure within the client's AWS environment and under their BAA with AWS.

Compliance Without Overhead:

HIPAA does not require a specific technology stack, but it does require documented controls. The team had to design technical controls and produce documentation simultaneously — system design became dual-purpose: functional architecture and compliance evidence.

Our Solution

We delivered the platform in three parallel workstreams across 6 weeks:

Workstream 1: PHI Infrastructure (Weeks 1-2)

  • Provisioned an AWS environment with a signed BAA, using AWS GovCloud-equivalent services in the EU (AWS Ireland with healthcare-appropriate service selection)
  • All PHI stored in RDS PostgreSQL with AES-256 encryption at rest using customer-managed KMS keys
  • VPC with private subnets for all PHI-handling services; no public database endpoints
  • S3 buckets for document storage with Server-Side Encryption (SSE-KMS) and Block Public Access enabled at account level
  • CloudTrail enabled across all regions for management plane audit logging
  • All service-to-service communication over TLS 1.2+ within the VPC

Workstream 2: Application Build (Weeks 2-5)

  • Patient and clinician authentication via Auth0 with MFA enforced for all clinician accounts, MFA strongly encouraged for patients
  • Role-based access control: patients access only their own records; clinicians access only records of patients with active or past appointments with that clinician
  • Appointment scheduling with iCal-based calendar sync for clinic integration
  • Secure messaging thread per patient-clinician pair, stored encrypted with per-thread keys
  • WebRTC video via coturn self-hosted TURN server; session tokens generated server-side and expired after appointment window
  • Encounter note and prescription record management with field-level validation and version history
  • Complete audit log on all PHI access: user, record, action, timestamp, IP — stored in CloudWatch Logs with a 7-year retention policy and no-delete protection

Workstream 3: Compliance Documentation (Weeks 4-6)

  • Risk assessment document mapping threats, likelihood, and mitigations
  • System security plan describing all controls by HIPAA Security Rule requirement
  • BAA templates for clinic partners
  • Incident response runbook
  • Sanity-check review with a HIPAA compliance consultant in Week 6 before go-live

Implementation

1. PHI Boundary and Data Classification

Produced a formal PHI boundary map identifying every field in the data model, every service touching PHI, and every data flow leaving the system. This boundary map drove all subsequent security decisions and served as the primary exhibit for clinic compliance reviewers.

2. Self-Hosted WebRTC Infrastructure

Deployed a coturn TURN/STUN server on a dedicated private EC2 instance within the client's VPC. Session credentials are generated server-side per appointment and expire at appointment end. No video media or metadata transits third-party infrastructure, eliminating external BAA dependency for video.

3. Clinician-Scoped Access Control

Implemented attribute-based access control where clinicians can only retrieve records for patients with whom they have an active or completed appointment relationship. Admin users have a separate, MFA-required elevated session for practice management functions with independent audit logging.

4. Immutable Audit Logging

Built a structured audit event system at the application layer, logging every PHI access to a dedicated CloudWatch log group with Object Lock equivalent retention policy. Log schema includes event type, actor, patient ID, record ID, timestamp, and originating IP. Audit queries are read-only via a separate IAM role.

5. Compliance Documentation Package

Produced a full HIPAA compliance documentation set: risk assessment, system security plan, policies and procedures (access management, incident response, workforce training, device use), and BAA templates. Delivered as a versioned document set so the client can update it as the product evolves.

6. Go-Live Compliance Review

Engaged a HIPAA compliance consultant for a 4-hour pre-launch review in Week 6. The review confirmed all required technical safeguards were in place and the documentation package was sufficient for clinic partner compliance assessment. Launched on day 42 of the engagement.

Key Features

  • HIPAA Security Rule Compliant Architecture
  • Self-Hosted WebRTC Video (No Third-Party PHI Exposure)
  • Patient and Clinician Role-Based Access Control
  • Immutable PHI Audit Logging (7-Year Retention)
  • Customer-Managed Encryption Keys (AWS KMS)
  • Secure Messaging with Per-Thread Encryption
  • Appointment Scheduling with iCal Integration
  • Full Compliance Documentation Package

Results & Impact

  • Launched in 42 days from kick-off to first live clinical consultation
  • Zero PHI findings from independent pre-launch HIPAA compliance review
  • 2 clinic pilot agreements activated within 2 weeks of launch, preserving both client relationships
  • 100% MFA adoption for all clinician accounts from day one of operation
  • 100% PHI access event coverage in the immutable audit log from go-live
  • BAAs executed with all infrastructure providers before any PHI was stored
  • Full compliance documentation package delivered — risk assessment, system security plan, BAA templates, and incident runbook

Business Benefits

  • Time to Market: Launched within the fixed pilot window, preserving both clinic relationships and investor confidence
  • Compliance Credibility: Full documentation package enabled clinic compliance teams to approve the platform without months of back-and-forth
  • Low Operational Risk: Architecture built around HIPAA minimum necessary standard — no over-collection, no unnecessary data exposure
  • Investor-Ready: HIPAA documentation and security architecture are standard due diligence requirements for healthcare investors
  • Scalable Foundation: Compliance controls designed as code and configuration, not one-off fixes — easy to maintain as the platform grows
  • Team Independence: The founding team received a full handover of documentation, runbooks, and infrastructure configuration to own and operate the platform going forward

Technologies Used

AWS (EKS, RDS, KMS, CloudTrail, S3)Auth0WebRTC / coturnPostgreSQLNext.jsNode.jsCloudWatch LogsTerraform

Conclusion

Compliance is often treated as an obstacle to speed. This engagement showed it does not have to be. By designing the PHI boundary and security controls before writing application code — not after — the team shipped a genuinely compliant product within the same timeline a non-compliant prototype would have taken. The clinics got a product they could trust; the founders got a platform they could grow.

Future Enhancements

Planned next phase includes NHS England integration via FHIR R4 APIs, expanded EHR integration for GP record access, and a patient data export capability aligned with UK GDPR data portability requirements.

Have a Similar Project in Mind?

Let's discuss how we can help you achieve similar results for your business.