Skip to content

Privacy & Security

Data Minimization

  • Default to feature extraction on‑device for speech; avoid storing raw audio unless explicitly consented.
  • Collect only necessary sensors; make each permission clear and revocable.

Security Controls

  • TLS 1.2+, AES‑256 at rest, KMS‑managed keys.
  • RBAC/ABAC with least‑privilege; periodic access reviews.
  • Secrets via environment variables and managed secret stores; rotation policy.
  • Audit logging for all admin/PHI touches.

Compliance

  • HIPAA/HITECH principles (BAA with cloud vendors as required).
  • GDPR: DPA, SCCs where applicable; user export/delete workflows.
  • Model governance: data lineage, reproducibility, bias reporting.

Risk Management

  • Threat modeling (STRIDE), regular pen‑tests, SAST/DAST.
  • Incident response runbook, RTO/RPO targets, backups with restoration drills.