Data Security and Governance in Clinical Video Infrastructure
1. ENCRYPTION AT SOURCE
Recording applications do not store raw, unencrypted video.
Immediate encryption during capture
The recording applications for iOS, Android, Windows, macOS, and fixed camera integrations capture the camera and microphone feed and encrypt the stream at the source device.
Encryption occurs before upload to any server environment.
This design reduces exposure in the event of:
- Device theft or loss
- Interception during transmission
- Unauthorized local access
MORE INFO
Encrypted upload and deletion from device
Each video is associated with a cryptographic key structure tied to user identity and role permissions within the institutional deployment. In practice:
- The creator of the video is assigned ownership at creation.
- Access to the video requires explicit authorization by the owner, in accordance with institutional policy.
- Decryption for viewing occurs only for authenticated and authorized users.
- Keys are managed within the institutional deployment, not shared across tenants.
2. DATA OWNERSHIP MODEL
Dedicated institutional deployments.
Each institution operates on a dedicated system, separated from other deployments.
There is no shared multi-institutional data pool.
- On EU-based cloud infrastructure
- On the institution’s preferred cloud provider
- On hospital or university on-premise servers
MORE INFO
- Controlled sharing for supervision or peer feedback
- Restricted access in summative assessment contexts
- Clear revocation pathways
3. SERVER LOCATION
AND DEPLOYMENT FLEXIBILITY
EU hosting options.
Institutions may select EU-based hosting environments to support GDPR compliance and data residency requirements.
MORE INFO
- Centralized identity management (e.g., SSO)
- Network access control policies
- Logging and monitoring alignment with existing SIEM tools
4. RETENTION AND LIFECYCLE CONTROL
- Academic year cycles
- Assessment regulations
- Research protocols
- National legal requirements
- Formative training videos
- Summative assessment recordings
- Research data
MORE INFO
- Learner
- Supervisor
- Examiner
- Administrator
- Research lead
This supports lifecycle management and least-privilege access.
5. LEGAL DEFENSIBILITY USES CASES
Informed consent documentation
- Information disclosure
- Patient questions
- Voluntary agreement
MORE INFO
- Examiners can conduct a second review.
- Decisions rely on observable evidence rather than recollection.
- Defined access lists
- Ethics committee–approved retention
- Cross-institution collaboration within controlled access boundaries
6. THREAT MODEL AWARENESS
The architecture explicitly addresses common threat scenarios.
Device loss
Unauthorized access
Human error
Cross-institution leakage
Vendor access
- Is video encrypted at the source before transmission?
- Are encrypted files automatically deleted from recording devices after upload?
- Does the institution retain full ownership and control over stored data?
- Can the deployment run on our chosen cloud or on-premise infrastructure?
- Can we define and enforce retention periods aligned with academic or legal cycles?
- Are deployments separated from other institutions at both logical and operational levels?
