Pulse Stack AI
← Back to Guide

Security and Compliance

Client encryption, sessions, CMEK, scope.

Client‑side PHI encryption (AES‑256 in storage)

Session expiry handling and recovery

On expiry, the assistant attempts to clear sensitive storage and offers encrypted session recovery for PHI fields when you re‑authenticate within a limited window.

GCS CMEK uploads and KMS health checks

What is protected vs not protected

Protected:

  • PHI at rest in browser storage (encrypted)
  • Audio at rest in cloud storage (Google‑managed or customer‑managed keys)
  • Short‑lived signed URLs for controlled access

Not fully protected:

  • Data in active memory while you use the assistant
  • Malicious browser extensions or XSS on the host page
  • Network traffic if not over HTTPS (your deployment should enforce HTTPS)

Always