GDPR & Privacy Statement
This statement describes how Amy-Term is designed to support GDPR-compliant deployments, and what remains the responsibility of the deploying organisation.
CodeSystem, ValueSet, ConceptMap),
which are generally non-personal data. GDPR relevance arises primarily from user administration, audit/telemetry, and any optional integration patterns.
1. Purpose and scope
This statement covers how Amy-Term supports GDPR-aligned deployment controls. It is not a substitute for the Controller’s legal analysis, Record of Processing Activities (RoPA), or a Data Protection Impact Assessment (DPIA) where required.
2. Data categories potentially processed
Administrative (typical)
- User account data: username; optionally email; roles; password hashes; timestamps.
- Session/auth metadata: session identifiers; login events; role assertions.
- Federation metadata: node identity; namespace identifiers; bundle identifiers; signatures; audit trail.
Operational (typical)
- Application logs: timestamp; endpoint path; HTTP status; correlation ids (if used).
- Security/audit logs: admin actions (create user, publish content, capture/export bundles).
- Infrastructure logs: reverse proxy / WAF / load balancer logs (deployment-specific).
What should not be logged
- Patient identifiers or clinical payloads in request/response bodies.
- Secrets such as API keys, database passwords, signing keys.
- Full request headers that may contain authentication tokens.
3. Roles and responsibilities
- Controller: typically the deploying organisation (hospital network, ministry, national service owner).
- Processor: if a third party hosts/operates Amy-Term on behalf of the Controller, the operator is typically a Processor.
4. Lawful basis (typical)
The lawful basis depends on the Controller’s context. Typical bases for the platform’s own administrative processing include:
- User accounts and access control: performance of a contract and/or legitimate interests (security and access governance).
- Operational and security logs: legitimate interests (service security, incident response, reliability).
5. Data minimisation and default configuration
- Store only the minimum administrative fields needed for authentication/authorisation and auditability.
- Limit log verbosity; avoid request-body logging.
- Use role separation (Viewer vs Admin) to minimise access to admin-only functions.
- Apply namespace governance to prevent cross-tenant or cross-region data mixing.
# Minimum GDPR-aligned operational defaults # 1) Do not log request bodies (especially for FHIR endpoints) # 2) Enable time-based log rotation + deletion # 3) Use TLS for non-local deployments # 4) Enforce least-privilege DB roles # 5) Separate admin and viewer roles
6. Retention
- Logs: retain according to deployment policy (recommended: time-based rotation and automatic deletion).
- User accounts: retained for the life of the deployment or until deleted by an authorised administrator.
- Federation audit records: retained according to governance/audit policy defined by the Controller.
7. Security measures (technical and organisational)
- Role-based access controls and session-based authentication for the UI.
- TLS recommended for all non-local deployments.
- Database backup/restore procedures; least-privilege database roles.
- Federation bundle signing and verification to protect integrity during distribution.
- Change control for terminology updates and federation distribution (approvals, release notes, auditability).
$ http://localhost:8000/docs $ http://localhost:8000/documentations/dpia $ http://localhost:8000/documentations/backup-restore $ http://localhost:8000/documentations/federation-trust-model
8. Data subject rights
Data subject rights requests (access, rectification, deletion) are handled by the Controller. For Amy-Term, this typically applies to user account data and operational logs relating to identified staff members.
- Define a process for account removal/deactivation and role review.
- Define a process for log redaction or extraction where applicable (deployment-specific).
9. Contact and governance
- Assign a service owner (Controller) and, if applicable, a Processor operations owner.
- Define procedures for account lifecycle, incident response, backup, and audit review.
- For larger deployments: maintain RoPA; conduct DPIA where required; document federation governance and key management.
Document: gdpr_privacy.html