Security & HIPAA Architecture

Signal Loom Legal Pre-Flight™ · Version 1.0 · 2026-04-16
Classification: Confidential · Attorney-Client Privilege · Work Product

Purpose: Defines security architecture for Signal Loom Legal Pre-Flight. Maps HIPAA compliance requirements layer by layer. Defines data isolation model, access controls, and deployment posture for WA State law offices.
Status: Pre-production · Pilot deployment pending · Full production hardening roadmap defined

§1 — Overview: Three Deployment Models

This document defines three deployment models for Signal Loom Legal Pre-Flight. Each model represents a different trade-off between HIPAA compliance obligations, infrastructure complexity, and security posture. The model selected depends on the firm's existing infrastructure and risk tolerance.

Model A — Attorney-Local

Data never leaves the attorney's infrastructure. No PHI on Signal Loom systems.

No BAA Required

Best for: Firms with existing HIPAA-compliant infrastructure

Model B — HIPAA Cloud + BAA

Signal Loom's HIPAA-configured cloud. Full SaaS. BAA required and provided.

BAA Required

Best for: Firms wanting managed infrastructure with HIPAA compliance

Model C — Zero-Knowledge

Client-side encryption. Signal Loom cannot read data in any form.

No BAA Required

Best for: Highest security requirements, government-adjacent clients

§2 — Authentication & Access Control

Current State

Production Target

§3 — Encryption

Encryption at Rest

Current: AES-256 field-level encryption. Specific PHI fields encrypted individually. Field-level approach protects data if other fields are compromised.

Production Target: Per-tenant encryption keys. Each law firm has its own unique encryption key. Key held in attorney-controlled KMS (Model C) or Signal Loom-managed HSM (Model B). No cross-tenant key sharing possible.

Algorithm: AES-256-GCM with random IV per encryption operation. Key derivation: HKDF with per-record salt. Key rotation: annual mandatory rotation with 90-day re-encryption window.

Encryption in Transit

Current: TLS 1.3 enforced on all connections. Certificate pinning for mobile clients. HSTS (HTTP Strict Transport Security) with 1-year max-age.

Production Target: TLS 1.3 with certificate pinning on all clients. Certificate Transparency logs monitored. Post-quantum key exchange consideration for long-term secret protection.

§4 — PHI Scope & Data Minimization

PHI Minimization Strategy

Signal Loom Legal Pre-Flight does NOT store raw medical records. The system stores a structured digest — a summary of clinical facts extracted from the records.

Stored (digest only): Case type, jurisdiction, injury descriptions, provider names (not full addresses), treatment dates (not times), diagnoses (coded), deviation flags, attorney work product notes.

NOT stored: Full medical records, imaging files, audio files (transcribed and discarded), Social Security numbers, driver's license numbers.

De-identified analytics: Usage analytics are maintained separately from case data. Analytics contain no PHI. Used for product improvement only.

§5 — Audit Logging

RequirementCurrent StateProduction Target
Log scopePer-action logging with user ID, timestamp, IP, action type, data accessedImmutable append-only logs. No delete or modify operations permitted on log entries.
Log integrityLogs stored in append-only database tableCryptographic integrity hash per log entry (SHA-256). Tampering detectable via hash chain verification.
RetentionDuration not formally defined6-year minimum retention (HIPAA minimum). Logs retained in geographically separate storage with 30-day hot cache.
AccessAttorney-owned data: attorney has read access to their own case audit logsAttorney-owned audit trail. Signal Loom staff access requires explicit written authorization from attorney. All access logged.
AlertingBasic error logging for system healthReal-time alerting on anomalous access patterns (multiple failed auth, access outside business hours, bulk data export).

§6 — Data Portability & Deletion

Attorney-Controlled Export

Current: Attorney can export their case data in structured JSON format. Export requires active MFA session.

Production Target: One-click full case export including all Pre-Flight analysis output, flag history, and audit log entries. Format: portable JSON + PDF report bundle. Export is attorney-initiated, self-served, no Signal Loom staff involvement required.

Cryptographic Erasure on Attorney Deletion

When an attorney deletes their account or a specific case:

  1. Attorney initiates deletion via authenticated request
  2. System marks all associated records as deleted (soft delete in primary DB)
  3. Encryption key for that tenant/case is scheduled for destruction
  4. Key destroyed within 24 hours (cryptographic erasure)
  5. All backups containing associated data scheduled for key destruction at next backup rotation
  6. Hard delete from primary storage after backup rotation cycle
  7. Audit log entry created documenting deletion with timestamp and actor

No soft delete recovery: After cryptographic erasure, there is no recovery path. This is intentional — it protects the attorney from both accidental and coerced data recovery.

§7 — Breach Notification

SLA commitment: Signal Loom will notify affected attorneys within 24 hours of confirmed breach of unsecured PHI. Notification includes: nature of breach, types of PHI involved, steps taken to contain breach, remedial measures recommended.

Attorney's obligation: The attorney, as a business associate or covered entity depending on deployment model, has independent breach notification obligations to HHS and affected individuals. Signal Loom's 24-hour notification gives the attorney time to fulfill their regulatory obligations.

Incident response plan: A documented incident response plan is maintained and tested annually. Includes: breach confirmation criteria, containment procedures, forensics protocol, notification procedures, post-incident review.

§8 — HIPAA Mapping

HIPAA RequirementImplementationModel AModel BModel C
§164.308(a)(1) Security Management ProcessRisk analysis + risk management plan. Annual review.
§164.308(a)(3) Workforce SecurityRole assignment, access authorization, termination procedures.
§164.308(a)(5) Security Awareness TrainingAnnual training required for all staff with PHI access.
§164.312(a)(1) Access ControlUnique user IDs, automatic logoff, encryption/decryption.
§164.312(b) Audit ControlsHardware, software, procedural mechanisms to record access.Limited
§164.312(c)(1) IntegrityAuthenticate ePHI. Mechanism to authenticate data.
§164.312(e)(1) Transmission SecurityTLS 1.3. Encryption in transit.
§164.400 HIPAA Breach Notification Rule24-hour notification SLA to downstream covered entities.N/A (no PHI)N/A (no PHI)

§9 — Production Hardening Roadmap

Phase 1 — Pre-Pilot (Current)

Phase 2 — Pilot (90 days post-signing)

Phase 3 — Production (Post-Pilot)

§10 — Limitations & Known Gaps

⚠️ Important: This document describes a pre-production security architecture. Actual compliance depends on deployment model, configuration, and ongoing security maintenance. This document does not constitute legal advice and does not create an attorney-client relationship. Consult qualified HIPAA counsel before deploying any system that handles Protected Health Information.