8. Security and Privacy
Principles: privacy by default; device-first feature extraction; minimal disclosure; revocability; verifiable processes via GAEA Certification and VCs; regional compliance and minimal retention.
Data classes: A (high sensitivity): wearable physiology and raw voice — default on-device only. B (medium): on-device emotional features/summaries; session-level EMOCOORDS. C (low): task metadata, evaluation metrics, anonymized usage statistics. D (public): public documents, certification standards, audit abstracts.
Consent: one-time with fine-grained reuse; rotating anonymous device IDs; minimal persona disclosure; restrictions for minors/sensitive scenarios; human-in-the-loop for finance, medical, and public matters.
Lifecycle: on-device preprocessing, liveness and anomaly filtering, explicit consent → TLS1.3+ transport with certificate pinning → partitioned encrypted storage (A/B with KMS/HSM) → least-privilege temporary tokens; immutable audit logs → region-specific TTL; revocation triggers removal and model stop; data portability; provenance and version tracking; model/data unlearning support.
Device/edge/cloud security: secure boot/firmware, anti-tamper, staged OTA; wearables upload features/summaries only; edge aggregation with rate limit and isolation; cloud RBAC/ABAC, zero trust, key rotation, hash-chained audit; SDK sandbox with least privilege and behavioral auditing.
Privacy technology and verifiable execution: ZK proofs for sensitive compute, certification, and settlement abstracts with selective disclosure; FL + DP; TEE with remote attestation; exploration of ZKML; VC for EC grades, validity, boundaries, and CRLs.
Licensing and revocation: LAT/MLN objects for dataset/model licensing with expiry and revocation; machine-verifiable policies for subject/place/object/time/purpose; unified CRL queries; immediate stop and removal on withdrawal.
Model security: poisoning/backflow defenses; robustness evaluation with adversarial sets; anti-exfiltration and anti-inference controls (response compression, confidence clipping, output perturbation, rate limits); policy guardrails.
Audit and transparency: end-to-end logs; third-party audits; public dashboards for EC distributions, CRL rates, revocation SLAs, and privacy incidents (de-identified). Incident response uses P0–P3 levels. Data subject rights SLAs cover access/export, correction/restriction, deletion/withdrawal, and appeals. Compliance mapping includes GDPR/CCPA/PIPL/PDPA/UK GDPR.
Data subject requests (SLAs & verification)
Request type
Response time
Completion deadline
Verification method
Notes
Data deletion
Acknowledge within T+72h
Complete within T+14 days
VC proof / audit logs
Emergency fast-track available
Model unlearning
Schedule within T+72h
Complete within T+30 days
Differential impact assessment
Impact report receipt
Access & portability
Immediate / <=72h
Immediate / <=7 days
Portable format
API / download link
Withdraw consent
Takes effect immediately
Complete within <=24h
Key revocation / policy
Gradual propagation
Region / regulation compliance mapping
Region / law
Data residency
Cross-border mechanism
Data subject rights
Retention
Legal basis
EU / GDPR
In-EEA
SCC / DPA
Access / rectification / erasure / portability
Shortest necessary
Legitimate interests / consent
US / CCPA / CPRA
In-state preferred
DPA / Terms of service
Notice / opt-out of sale
Shortest necessary
Contract / consent
China / PIPL & CSL
In-country storage
Security assessment
Access / rectification / erasure
Shortest necessary
Statutory / consent
Singapore / PDPA
Local-preferred
Transfer agreement
Access / rectification
Shortest necessary
Consent / legitimate interests
UK / UK GDPR
In-UK
IDTA / SCC
Access / erasure / restriction of processing
Shortest necessary
Legitimate interests
Last updated