Skip to main content
External-Proof ReadyPublic

Security And PHI Boundary

Show what is public, gated, authenticated, internal, or never exposed.

Security content makes the review path safe: public pages show positioning and operator-safe evidence; authenticated surfaces own PHI, credentials, and live actions.

Owner

Security boundary

Audience

CISO, compliance, legal, technical reviewers, and release approvers

Source authority

Security boundary owns public/gated/authenticated classification.

Implemented workflows

  • Public artifact classification
  • Forbidden-field scan
  • Evidence redaction
  • Protected preview review
  • Live-action go/no-go

System responsibilities

  • Cap proof language to evidence status
  • Protect PHI and credentials
  • Separate research/public-health readiness from raw cohort access

Data inputs and outputs

  • Public pages expose safe summaries
  • Gated packets handle diligence
  • Authenticated apps own operational detail
Boundary

Public outside, protected detail inside.

No PHI, credentials, raw payloads, endpoint secrets, or execute controls on public pages.

Architecture visuals

Diagrams explain the operating logic.

Mermaid diagram

Public And App Access Boundary

Separates public marketing, gated evidence, and authenticated app access.

flowchart LR
  www[www.healthdatainmotion.com] --> publicPages[Public solution and proof pages]
  publicPages --> gated[Evidence room requests]
  publicPages --> datamotion[datamotion app access]
  publicPages --> dqm[dqm app access]
  publicPages --> atlas[atlasnexus app access]
  datamotion --> auth[Authenticated runtime]
  dqm --> auth
  atlas --> auth
  auth --> privateData[PHI and tenant operations stay private]
Known limits

What remains gated, deferred, or status-bound.

Live-proof claims stay capped until named live packets pass approval and negative tests.