Persyst 15

Persyst is committed to protecting patient data and supporting hospital IT environments with clear and effective cybersecurity practices. The information below is provided to assist clinical and IT teams in deploying and maintaining Persyst EEG Analysis Software securely.

Installation Security Checklist

  • Persyst does not require an internet connection for clinical use.
  • All data remains local and is not transmitted externally.
  • There are no usernames, passwords, or login screens within the software.
  • Recommended antivirus exclusions (file types): .af1, .af2, .ar, .indx, .lay, .mg2, .mmx, .raw, .sd4, .xml
  • All installers and software binaries are digitally signed.

Network Behavior

  • Optional licensing and diagnostics use outbound-only HTTPS connections to *.persyst.com (TLS 1.2+).
  • Blocking this traffic does not affect clinical use but may disable automatic license refresh and diagnostics.
  • Diagnostic uploads can be disabled at any time through the software interface.

Update Policy

  • Updates are distributed as digitally signed installers.
  • No automatic or silent updates are performed. Installation is manual and under IT control.

PHI and Data Handling

  • Persyst does not collect or transmit protected health information (PHI).
  • All patient data is processed and stored within the hospital’s secure environment.

Responsible Vulnerability Disclosure

If you are a security researcher or hospital IT representative and believe you have discovered a vulnerability in Persyst software, please contact us at:

support@persyst.com

This page is intended for hospital IT and clinical administrators. Detailed threat models, test results, and architecture documents are maintained internally and submitted to regulatory authorities as required.