Last updated on:
October 3, 2025

HIPAA compliance in Canada: Laws & regulations to know

HIPAA compliance in Canada

HIPAA in Canada doesn't apply - except when it absolutely does. If you're a U.S. company expanding north or a Canadian business serving American patients, you're navigating one of healthcare privacy's most misunderstood compliance challenges.

A single HIPAA violation cost Anthem Inc. $16 million. Meanwhile, Canada's LifeLabs breach affected 15 million people and resulted in $0 in regulatory fines—though class action settlements in Canadian courts reached nearly $10 million. This enforcement gap creates a dangerous illusion that privacy compliance matters less in Canada. With major breach costs reaching $10+ million, class action lawsuits mounting, and new enforcement powers taking effect, Canadian healthcare privacy demands urgent attention - just for entirely different reasons than HIPAA law.

This guide reveals the surprising truths about HIPAA regulations in Canada, the costly mistakes companies make at the US-Canada border, and exactly what you need to achieve HIPAA compliance in 2025.

Does HIPAA apply in Canada? The jurisdictional paradox

The fundamental question isn't "where is the data?" It's "whose data is it?"

Does HIPAA apply in Canada

HHS is clear on this: HIPAA law is U.S. federal law with U.S. territorial jurisdiction. It does not apply within Canada's borders to Canadian patients receiving care from Canadian providers.

The critical exception: HIPAA Canada compliance absolutely applies to any entity - regardless of location - that handles U.S. patient protected health information (PHI).

A Canadian telemedicine provider treating U.S. patients via virtual care must comply with HIPAA. A Canadian healthcare technology vendor providing services to U.S. hospitals becomes a HIPAA business associate. Canadian research organizations participating in U.S. clinical trials, medical device manufacturers processing data from U.S. patients, or any Canadian company acting as a business associate to a U.S. covered entity - all subject to HIPAA compliance Canada requirements.

The location trap reveals the core misconception: U.S. patient data stored on Canadian servers by a Canadian company using Canadian employees is still subject to HIPAA. The patient's nationality and the data's origin matter more than the server's physical location or your company's headquarters.

The reverse scenario works the same way: Canadian patient data stored in U.S. data centers remains subject to Canadian privacy laws (PIPEDA, provincial health acts). Location of infrastructure doesn't change jurisdictional requirements.

Cross-border healthcare businesses face simultaneous compliance with HIPAA for U.S. patients AND Canadian privacy laws for Canadian patients, with completely different consent models, breach notification requirements, and enforcement mechanisms.

Canada's HIPAA equivalents: The patchwork system

Canada doesn't have a single "HIPAA equivalent." Instead, a complex network of federal and provincial laws together regulates healthcare privacy.

PIPEDA: Canada's federal privacy foundation

The Personal Information Protection and Electronic Documents Act (PIPEDA) is often compared to HIPAA, but this comparison misleads. PIPEDA is actually more similar to Europe's GDPR than to HIPAA law.

While HIPAA is sector-specific healthcare legislation, PIPEDA applies to ALL personal information (not just health data) across ALL commercial activities in Canada. It covers private sector organizations collecting, using, or disclosing personal information in commercial activities, extends to federally-regulated businesses (banks, airlines, telecommunications) including their employee data, and applies to cross-border and interprovincial data transfers. PIPEDA does not apply to employee information in provincially regulated organizations—provincial employment privacy laws govern those relationships instead.

PIPEDA's 10 Fair Information Principles establish requirements for accountability, identifying purposes, consent, limiting collection/use/disclosure/retention, accuracy, safeguards, openness, individual access, and challenging compliance.

Since November 2018, organizations must report breaches creating "real risk of significant harm" to the Privacy Commissioner of Canada, affected individuals, and other organizations that can reduce risk—all "as soon as feasible." ALL breaches must be documented and retained for 24 months minimum, regardless of reporting thresholds.

The enforcement reality: The Office of the Privacy Commissioner of Canada (OPC) cannot impose fines for most violations. Maximum penalties of $100,000 apply only to three specific criminal offenses (destroying information, retaliation, obstruction). The OPC issues findings, recommendations, and compliance orders instead.

Which provincial laws apply to your organization?

Ten provinces and three territories have enacted their own health privacy legislation. When provincial law is deemed "substantially similar," it applies INSTEAD of PIPEDA for within-province activities. PIPEDA still applies to cross-border and interprovincial transfers.

"Substantially similar" provinces include Ontario (PHIPA), British Columbia (PIPA), Alberta (PIPA), New Brunswick (PHIPAA), Newfoundland and Labrador (PHIA), Nova Scotia (PHIA), and Quebec (Law 25). Manitoba, Saskatchewan, and Prince Edward Island require dual compliance with both provincial and federal law.

Provincial differences create operational challenges. Ontario requires express consent for disclosure to non-custodians but accepts implied consent for care, mandates 30-day access request response, with organizational penalties up to $1 million. Quebec enforces the strictest privacy regime in North America—now exceeding even HIPAA's burdens. As of 2025, Quebec Law 25 is fully in force with mandatory privacy officers, mandatory Privacy Impact Assessments for high-risk activities, breach reporting within 72 hours when risk of serious injury exists, Transfer Risk Assessments required for all data leaving Quebec (even to other Canadian provinces), and penalties up to $25 million or 4% of global revenue, whichever is higher. Manitoba permits express or implied consent, requires 24-hour response for in-patients or 72 hours for current care, with penalties of $50,000 per violation.

A national Canadian healthcare company must comply with multiple different provincial laws simultaneously, each with distinct requirements.

HIPAA vs Canadian privacy laws: Critical differences


Feature HIPAA (U.S.) HIPAA (U.S.)
Scope Healthcare entities only (covered entities + business associates) All private sector organizations handling personal data
Consent Model Permitted uses without explicit consent for treatment/payment; certain uses require explicit authorization (opt-in) Express (opt-in) consent generally required for collection and use, with some exceptions for implied consent
Breach Reporting Deadline: 60 calendar days from discovery Notify “as soon as feasible” if breach poses real risk of significant harm (harm test)
Penalties Civil fines up to millions of dollars; criminal penalties possible Fines up to CAD 100,000 per violation via court order; enforcement mainly through audits and class actions
Type of Data Protected Protected Health Information (PHI) only All personal information, including health and non-health data
Jurisdiction United States only Canada; applies to interprovincial and international data flows
Transparency Privacy notices required; patient right to access medical records Strong emphasis on transparency and accountability; access/correction rights to personal data

Who must comply with HIPAA vs Canadian privacy laws?

HIPAA applies only to "covered entities" (healthcare providers, health plans, clearinghouses) and their "business associates"—sector-specific to healthcare, covering only PHI, based on entity type.

PIPEDA applies to ALL private sector organizations in commercial activities handling any personal information, not just health data. Provincial health acts apply to "custodians" or "trustees" with broader application based on information type and activity, not limited to specific entity categories.

A non-healthcare business handling health information in Canada may be subject to PIPEDA, while the same business in the U.S. would not be subject to HIPAA unless it's a business associate.

Consent requirements: The fundamental divide

HIPAA operates on "permitted uses" without consent—treatment, payment, and healthcare operations (TPO) permitted without authorization, Notice of Privacy Practices required, authorization required only for marketing, sale of PHI, and psychotherapy notes. It's essentially an opt-out model with notices.

Canadian law requires consent as the foundation. Express consent is required for sensitive information (especially health data), implied consent acceptable only in limited circumstances, purpose must be identified before or during collection, and individuals can withdraw consent at any time. It's an opt-in model with active consent.

A U.S. healthcare provider can use patient data for quality improvement without specific consent (it's healthcare operations). A Canadian healthcare provider typically needs consent or must rely on specific statutory exceptions.

When must you report a breach under HIPAA vs Canadian law?

HIPAA requires notification for breaches affecting 500+ individuals within 60 days to HHS and media, annual reporting for breaches under 500, individual notification for all breaches with no harm threshold, and a presumption of breach unless the organization demonstrates low probability of compromise.

PIPEDA uses a "real risk of significant harm" (RROSH) threshold based on sensitivity of information plus probability of misuse. Organizations report to Privacy Commissioner and notify affected individuals "as soon as feasible," must record ALL breaches for 24 months minimum regardless of reporting requirement.

HIPAA has specific timeframes; Canada uses "as soon as feasible." HIPAA presumes notification required; Canada requires harm assessment. HIPAA has size thresholds; Canada uses harm threshold.

What penalties do you face for violations?

U.S. HIPAA penalties (2025, adjusted for inflation) range from $141 per violation for unknowing breaches to $63,973 per violation for willful neglect not corrected, with annual caps up to $2 million per violation type per year (adjusted annually under HITECH/ARRA). Criminal penalties reach $250,000 and 10 years imprisonment.

Recent HIPAA enforcement includes Anthem Inc. (2018): $16 million - the largest HIPAA fine ever.

Penalty Structure for HIPAA Violations


Penalty Tier Level of Culpability Minimum Penalty per Violation Maximum Penalty per Violation Annual Penalty Limit
Tier 1 Reasonable Efforts $141 $71,162 $2,134,831
Tier 2 Lack of Oversight $1,424 $71,162 $2,134,831
Tier 3 Neglect – Rectified within 30 days $14,232 $71,162 $2,134,831
Tier 4 Neglect – Not Rectified within 30 days $71,162 $2,134,831 $2,134,831

Source: HIPAA Journal

Canadian federal PIPEDA allows maximum $100,000 fines only for three specific criminal offenses. The OPC cannot impose fines for general privacy violations. Provincial penalties vary: Ontario authorizes up to $1 million with AMPs up to $500,000, Quebec allows up to $25 million or 4% of global turnover, Manitoba permits $50,000 per violation.

Canadian healthcare privacy enforcement (2020-2025): $0 in regulatory fines, 0 publicized criminal prosecutions, 0 Ontario AMPs used. Even the massive LifeLabs breach affecting 15 million Canadians resulted in $0 in regulatory fines—though class action settlements reached nearly $10 million. Canadian courts and class actions are increasingly the de facto enforcement mechanism for major breaches, since regulators lack comparable fine powers.

The approximate enforcement ratio based on regulatory penalties imposed: 100:1 (U.S. vs Canada).

Without financial deterrents, Canadian compliance relies on actual breach costs (averaging $10+ million), reputational damage, civil liability and class action lawsuits, professional regulatory consequences, and future risk of strengthened enforcement.

Common misconceptions and costly mistakes

Common misconceptions and costly mistakes

"We're in Canada, so HIPAA doesn't apply"

If you handle U.S. patient data, HIPAA absolutely applies regardless of your physical location. A Canadian telemedicine startup launching service for U.S. patients that assumes Canadian laws are sufficient discovers after their first breach that they're subject to HIPAA as business associates, facing potential multi-million dollar penalties and expensive remediation.

HIPAA follows the patient, not the provider's location.

"PIPEDA is Canada's HIPAA - they're basically the same"

HIPAA is healthcare-specific; PIPEDA covers all personal information. HIPAA covers only covered entities and business associates; PIPEDA covers all commercial organizations. HIPAA permits TPO without consent; PIPEDA requires consent as foundation.

You cannot use HIPAA compliance to satisfy PIPEDA requirements or vice versa. You need separate compliance programs.

"Storing data on Canadian servers eliminates U.S. law concerns"

The U.S. CLOUD Act allows American authorities to access data stored abroad by U.S. companies. If you use American cloud providers (AWS, Microsoft Azure, Google Cloud), U.S. authorities can issue warrants to access data stored on Canadian servers.

Solutions include using Canadian-owned cloud infrastructure for highly sensitive data, implementing encryption with customer-controlled keys, conducting Transfer Risk Assessments (required in Quebec), and understanding jurisdictional risks in vendor selection.

"Business Associate Agreements work the same way in Canada"

Canada doesn't have standardized BAA requirements like HIPAA. Each provincial law has different classifications with requirements varying by province and entity classification, requiring case-by-case privacy protection term negotiation.

"If we comply with HIPAA, we're covered for Canada"

Rolling out U.S. privacy programs unchanged in Canada almost always creates violations. HIPAA's notice-based consent approach doesn't meet Canada's consent requirements. Canada's Anti-Spam Law (CASL) is opt-in, not opt-out. PIPEDA applies to employee data for federally-regulated businesses while HIPAA generally doesn't cover employee PHI.

Companies often treat Quebec as "just another province" and face significant compliance gaps. Quebec's Law 25—fully in force by 2025—creates the strictest privacy regime in North America, often exceeding HIPAA's burdens. Mandatory privacy officers, mandatory Privacy Impact Assessments for high-risk activities, breach reporting within 72 hours when risk of serious injury exists, Transfer Risk Assessments required for all data leaving Quebec (even to other Canadian provinces), and penalties up to $25 million or 4% of global revenue, whichever is higher (directly mirroring GDPR's enforcement model), demand separate attention.

Cross-border data transfers: Navigating the complexity

When US companies must comply with Canadian law?

U.S. companies opening Canadian subsidiaries face Canadian law (PIPEDA and provincial), must register as doing business in Canada, and need separate Canadian compliance programs.

U.S. companies providing services to Canadian customers depend on whether they have "real and substantial connection" to Canada. Targeting the Canadian market likely triggers Canadian law.

U.S. companies acting as service providers to Canadian healthcare organizations must meet Canadian security and privacy requirements and may need to comply with both HIPAA and Canadian requirements.

When Canadian companies must comply with HIPAA?

Canadian companies providing services to U.S. covered entities automatically become HIPAA business associates, must sign Business Associate Agreements, must comply with full HIPAA Security and Privacy Rules, and are subject to OCR enforcement and penalties.

Canadian providers treating U.S. patients trigger HIPAA when handling U.S. PHI, require dual compliance (HIPAA for U.S. patients, Canadian law for Canadian patients), and must segregate data and processes.

Cross-border transfer requirements

How to transfer FROM Canada TO US:

PIPEDA generally permits transfers with appropriate safeguards, requires legal basis, mandates informing individuals data may be accessed by foreign governments, and needs contractual protections.

Provincial requirements vary dramatically. Ontario permits transfers with appropriate agreements. BC and Nova Scotia restrict public sector data from leaving Canada. Quebec Law 25 highly restricts transfers - requiring individual consent, Privacy Impact Assessment, data processing agreement, and Transfer Risk Assessment.

How to transfer FROM US TO Canada:

HHS guidance confirms transfers are permitted with appropriate BAAs and safeguards.

The U.S. CLOUD Act allows U.S. authorities to access data stored by U.S. companies anywhere in the world, applies to AWS, Microsoft Azure, and Google Cloud even on Canadian servers, and may create conflicts with Canadian privacy obligations.

Mitigation strategies include encryption with customer-controlled keys, Canadian-owned infrastructure for highly sensitive data, contractual provisions requiring notification of government access requests, and regular risk assessments.

Redaction requirements for Canadian health information

Regulatory submissions to Health Canada, public disclosure, FOIA requests, research data sharing, and records management require proper redaction.

Health Canada's PRCI guidelines establish requirements for clinical data anonymization including risk assessment approaches, context-specific evaluation, quantitative risk assessment for re-identification, and documentation of redaction methodology.

Manual Redaction False Security

The false security of manual redaction

Black boxes in PDFs don't remove data - underlying text remains in the file, metadata stays accessible, and forensic tools can recover "redacted" information.

Manual redaction is time-consuming and error-prone, difficult to track for audit purposes, provides no verification of complete data removal, and leads to exposure through human error.

Professional redaction software requires permanent data removal (not just visual masking), guaranteed metadata removal, comprehensive audit trails, redaction certificates for compliance verification, and support for multiple data formats.

Permanent redaction vs manual visual hiding

See how Redactable actually removes your data

Practical compliance roadmap

For US companies expanding into Canada

Practical compliance roadmap in Canada

Determine applicable laws (Week 1). Identify provinces you'll operate in, whether you'll have Canadian employees, what health information you'll handle, and if you're federally-regulated.

Conduct gap analysis (Weeks 2-3). Compare your HIPAA program against Canadian requirements for consent (need express consent, must identify purposes before collection, allow withdrawal), breach notification (use "real risk of significant harm" threshold, notify Privacy Commissioner, record ALL breaches for 24 months), and marketing (must comply with CASL opt-in requirements).

Develop Canadian privacy program (Weeks 4-8). Create privacy policy, consent management, breach response, access/correction procedures, data retention, and cross-border transfer procedures.

Document Privacy Impact Assessments (mandatory in Quebec), information inventory, vendor assessments, consent records, and breach records.

Appoint privacy officer, establish governance, create training program, and implement complaint mechanism.

Implement safeguards (Weeks 6-12). Deploy encryption, access controls, audit logging, network security, and incident response.

Establish written agreements with service providers, annual privacy training, access reviews, policy updates, and vendor management.

Launch training (Week 8+). Train staff on Canadian privacy law basics, consent requirements, access requests, breach response, and cross-border transfers.

Establish ongoing compliance (Month 3+). Conduct annual training, quarterly governance meetings, monthly vendor checks, annual audits, and policy reviews.

For Canadian companies handling US patient data

Canadian companies handling us patient data

Understand HIPAA business associate status (Week 1). You must sign BAAs, comply with HIPAA Security and Privacy Rules, follow Breach Notification Rule, and face OCR enforcement.

Implement HIPAA Security Rule (Weeks 2-8). Deploy administrative safeguards (Security Officer, risk assessment, risk management, security policies, workforce security, access management, training, incident procedures, contingency planning, evaluation).

Establish physical safeguards (facility access, workstation security, device controls) and technical safeguards (access controls, audit controls, integrity controls, transmission security).

Document policies and procedures with 6-year retention.

Understand breach notification (Week 3). Threshold: breach of unsecured PHI. Timeline: individual notification within 60 days; HHS notification within 60 days (500+ affected) or annual report (under 500).

Negotiate BAAs (Weeks 2-4). Required provisions include permitted uses, prohibition on further disclosure, safeguards requirement, breach reporting, subcontractor compliance, individual access, accounting, HHS investigations, PHI return/destruction, and termination authorization.

Maintain dual compliance (Ongoing). For Canadian data: comply with PIPEDA and provincial law, obtain Canadian consent, follow RROSH threshold, report to Privacy Commissioner. For U.S. data: comply with HIPAA, follow HIPAA authorization, use presumption + 60-day timeline, report to HHS.

Segregate data and processes to maintain clear compliance boundaries.

Train staff (Week 6+). Train on HIPAA basics, Security Rule, breach response, Canadian privacy law, and how to identify which rules apply to which data.

Building trust through privacy excellence

HIPAA follows the patient's nationality, not your company's location. Canadian privacy laws follow your organization's jurisdiction and activities. When operating across borders, you may need both - simultaneously, with completely different requirements.

The consent models are fundamentally different. Breach notification thresholds differ. Enforcement mechanisms diverge dramatically. The penalties - or lack thereof in Canada - create different compliance incentives.

But regardless of jurisdiction, protecting patient privacy builds trust. Trust drives patient relationships, competitive advantage, and long-term success. Organizations that view privacy compliance as merely checking regulatory boxes miss the strategic opportunity. Those that embrace privacy as a core value - implementing robust safeguards, respecting individual rights, and demonstrating accountability - position themselves as trusted partners in an increasingly data-driven healthcare ecosystem.

Your next steps

  • Start with assessment: determine which laws apply to your operations, conduct a gap analysis against current practices, and identify specific compliance requirements by jurisdiction.
  • Appoint a privacy officer with cross-border expertise, implement appropriate technical and administrative safeguards.
  • Establish separate workflows for U.S. and Canadian patient data where dual compliance is required.
  • Train your workforce on jurisdiction-specific requirements and document everything - consent records, breach logs, Privacy Impact Assessments, and vendor agreements form your defense in enforcement actions or litigation.

Protect sensitive data with professional redaction

Black boxes placed by PDF editor tools don't remove data - underlying text, metadata, and hidden layers remain accessible to forensic tools. For FOIA requests, regulatory submissions to Health Canada, and cross-border data sharing, incomplete redaction creates liability under both HIPAA and Canadian privacy laws.

Redactable's AI-powered platform permanently removes sensitive data with guaranteed metadata removal, delivering 98% time savings with comprehensive audit trails and compliance-ready certificates. From FOIA responses to Health Canada submissions, ensure permanent, verifiable redaction that meets both U.S. and Canadian requirements.

Interested in learning more?

Learn why we're the #1 redaction software today!
Try for free

Frequently asked questions

Does HIPAA apply to Canadian companies?

HIPAA applies to any organization that handles U.S. patient PHI, regardless of location. Canadian companies providing services to U.S. covered entities, treating U.S. patients, or participating in U.S. clinical trials become HIPAA business associates and must comply with full HIPAA Security and Privacy Rules, subject to OCR enforcement and penalties.

Can a U.S. company rely on HIPAA compliance when operating in Canada?

No. HIPAA compliance does not satisfy Canadian privacy requirements. The consent models are fundamentally different - HIPAA's notice-based approach won't meet Canada's consent-first framework. Breach notification thresholds differ. PIPEDA applies to all personal information including employee data for federally-regulated businesses, while HIPAA doesn't generally cover employee PHI. You need separate compliance programs.

Which Canadian privacy law applies to my healthcare organization?

It depends on your jurisdiction and sector. Federally-regulated businesses (banks, airlines, telecommunications) face PIPEDA nationwide. Organizations operating entirely within a province with "substantially similar" law comply with provincial law (Ontario PHIPA, BC PIPA, Alberta PIPA, Quebec Law 25, etc.). Manitoba, Saskatchewan, and Prince Edward Island require dual compliance with both provincial and federal law. Cross-border and interprovincial data transfers trigger PIPEDA regardless of provincial law.

What's the biggest mistake companies make with cross-border healthcare privacy compliance?

Assuming server location determines jurisdiction. U.S. patient data stored on Canadian servers by a Canadian company is still subject to HIPAA. Canadian patient data stored in U.S. data centers remains subject to Canadian privacy laws. The patient's nationality and data's origin matter more than infrastructure location. Companies also frequently roll out U.S. privacy programs unchanged in Canada, creating immediate violations.

Why are there no regulatory fines for Canadian healthcare privacy breaches?

The Office of the Privacy Commissioner of Canada cannot impose fines for most violations—maximum penalties of $100,000 apply only to three specific criminal offenses. Provincial commissioners in most provinces (except Quebec and Ontario) lack direct fine authority. Canadian courts and class action lawsuits have become the de facto enforcement mechanism. The LifeLabs breach affected 15 million people with $0 in regulatory fines but nearly $10 million in class action settlements.

What makes Quebec's Law 25 stricter than HIPAA?

Quebec Law 25 creates the strictest privacy regime in North America with mandatory privacy officers, mandatory Privacy Impact Assessments for high-risk activities, breach reporting within 72 hours when risk of serious injury exists, Transfer Risk Assessments required for all data leaving Quebec (even to other Canadian provinces), and penalties up to $25 million or 4% of global revenue, whichever is higher. These requirements often exceed HIPAA's burdens and mirror GDPR's enforcement model.

How do I handle consent for patients in both the U.S. and Canada?

Maintain separate consent workflows. For U.S. patients under HIPAA, Notice of Privacy Practices with permitted uses for treatment, payment, and healthcare operations. For Canadian patients, obtain express consent before collecting sensitive health data, identify purposes before or during collection, and allow consent withdrawal at any time. Best practice: segregate data and processes to maintain clear compliance boundaries.

What are the real costs of non-compliance if Canadian regulators don't impose fines?

Breach response, recovery, legal fees, and notification costs average $10+ million per incident. Class action settlements can reach millions (LifeLabs: nearly $10M). Reputational damage affects patient acquisition and retention. Professional regulatory consequences impact licensing. U.S. operations face OCR enforcement with penalties reaching millions per violation. The regulatory enforcement gap doesn't eliminate financial exposure - it just shifts it to civil liability.

Do I need different redaction processes for HIPAA vs Canadian privacy laws?

The redaction requirements are similar, but documentation differs. Both require permanent removal of identifiers, not just visual masking. HIPAA has a de-identification safe harbor; Canada doesn't—even anonymized health data may remain protected. Health Canada's PRCI guidelines require documented risk assessments and audit trails for regulatory submissions. Professional redaction software with guaranteed metadata removal, comprehensive audit trails, and compliance-ready certificates satisfies both U.S. and Canadian requirements.

Can I use U.S. cloud providers (AWS, Azure, Google Cloud) for Canadian patient data?

Yes, but with important caveats. The U.S. CLOUD Act allows American authorities to access data stored by U.S. companies anywhere in the world, even on Canadian servers. This may violate Canadian privacy laws requiring protection against foreign access, particularly concerning for provinces with data residency restrictions (BC, Nova Scotia public sector; Quebec's heightened requirements). Mitigation strategies include encryption with customer-controlled keys, contractual provisions requiring notification of government access requests, and conducting Transfer Risk Assessments (required in Quebec).

Ready to get started?

Try Redactable for free and find out why we're the gold standard for redaction
Try for free
Secure icon, green background and white checkmark

No credit card required

Secure icon, green background and white checkmark

Start redacting for free

Secure icon, green background and white checkmark

Cancel any time