Console

Every privacy promise, from the regulator.

Fifteen regulations. Four continents. One unverifiable sentence.

Each entry below quotes the regulator verbatim, cites the primary source, and — where the regulator serves HTML — uses W3C text fragments so your browser scrolls to and highlights the exact sentence. Ordered by industry, not fame — the repetition within each cluster is the argument.

Read the manifesto →Comparison vs existing tools →Read the code →

Cross-industry

Cross-industry

The regulations that every data-holding company above a certain size must answer to, regardless of vertical. The clause is the same across three continents and four legal systems.

🇪🇺

GDPR

General Data Protection Regulation · Regulation (EU) 2016/679

All sectorsEuropean Union

Article 32(1) — Security of processing

the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk… the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services.

Note. EUR-Lex is the canonical EU regulator source but does not serve per-article fragment anchors. The UK post-Brexit retained version on legislation.gov.uk is substantively identical for this article and provides a scrollable deep link.

Why it cannot be verified

"Appropriate" and "appropriate to the risk" are self-graded standards defined by the controller. A data subject has no way to observe "unauthorised processing" from outside the controller’s systems, and Article 30 records are shared only with supervisory authorities on request — never with the affected person.

What structure changes

The per-user Merkle chain is not a policy attestation. It is a cryptographic record of every access, verifiable by the data subject in their own browser. "Appropriate" stops being a word and becomes a hash.

Enforcement on record. Meta Platforms Ireland Limited, May 2023: €1.2B fine under GDPR Article 46 for international data transfers. Amazon Europe, July 2021: €746M fine. The underlying audit evidence both companies produced was a standard query against their own internal logs.

🇺🇸

CCPA / CPRA

California Consumer Privacy Act & California Privacy Rights Act · Cal. Civ. Code §1798.100 et seq.

All sectorsCalifornia, USA

§1798.100(e) — Reasonable security

A business that collects a consumer’s personal information shall implement reasonable security procedures and practices appropriate to the nature of the personal information to protect the personal information from unauthorized or illegal access, destruction, use, modification, or disclosure…

Note. California’s leginfo site does not serve sub-section fragment anchors. The URL lands on the full text of §1798.100 — the quoted clause is subsection (e). The text-fragment link jumps directly to the quoted sentence in browsers that support the W3C Text Fragments spec.

Why it cannot be verified

"Reasonable" is defined retroactively by plaintiffs’ counsel and defendants’ experts after a breach has already happened. It is never defined in advance by the consumer whose data is at stake.

What structure changes

The access record exists before the breach, is tamper-evident during the breach, and is visible to the consumer the same day. "Reasonable" becomes measurable.

🇨🇳

PIPL

Personal Information Protection Law of the People’s Republic of China · 个人信息保护法

All sectorsPeople’s Republic of China

Articles 9 & 54 — Handler responsibility; self-audit

Personal information handlers shall bear responsibility for their personal information handling activities, and adopt the necessary measures to safeguard the security of the personal information they handle… Personal information handlers shall regularly engage in audits of their personal information handling and compliance with laws and administrative regulations.

Note. The official text is Mandarin. The English text shown here is from the Stanford DigiChina translation, which is the most widely cited English rendering but is not the law. The amended Cybersecurity Law (effective January 2026) adds AI governance provisions that intersect with PIPL Article 24.

Why it cannot be verified

Every verb grades itself: the handler defines "necessary measures," the handler conducts its own "regular audits," and no provision grants the data subject a right to see the access log. Article 24’s "transparency shall be guaranteed" for automated decisions is a promise about a property of the system, not a record the subject can inspect.

What structure changes

代码是信任锤子 — the code is the trust anchor. The chain is visible to the data subject in any browser, in any jurisdiction, without the handler’s cooperation.

🌐

SOC 2

AICPA Trust Services Criteria for Security · Common Criteria CC6.1

B2B SaaS auditGlobal (framework)

CC6.1 — Logical and physical access controls

The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity’s objectives.

Note. SOC 2 is not a statute — it is a private-sector audit framework published by the AICPA. A SOC 2 Type II report is prepared by a CPA firm paid by the audited company and shared under NDA with enterprise customers. The data subject is never a party to the audit.

Why it cannot be verified

The word "objectives" is a self-defined scope, the word "implements" is graded by a paid auditor, and the report is NDA-gated. Your customer can ask to see a SOC 2 report, but your customer’s customer (the actual data subject) cannot.

What structure changes

The per-user chain is not NDA-gated. The end user whose data was touched verifies the chain client-side in WASM, in the same browser they check their email in. SOC 2 attestation becomes evidence a CPA verifies; the chain becomes evidence the user verifies.

Healthcare

Healthcare

Medical data is the most-regulated category of personal information in the US, and the clause is the same every time: access is limited to personnel who determine, themselves, what the minimum necessary access is. Four different regulations, four different voices, one structural gap.

🇺🇸

HIPAA Privacy Rule

Health Insurance Portability and Accountability Act · Privacy Rule

Healthcare / PHIUnited States

45 CFR §164.502(b)(1) — Minimum necessary

When using or disclosing protected health information or when requesting protected health information from another covered entity or business associate, a covered entity or business associate must make reasonable efforts to limit protected health information to the minimum necessary to accomplish the intended purpose of the use, disclosure, or request.

Why it cannot be verified

"Reasonable efforts" and "minimum necessary" are entirely self-defined by the covered entity. A patient has no statutory right to see who on the workforce read their record, when, or for what purpose. HIPAA’s own accounting-of-disclosures provision (§164.528) excludes internal treatment, payment, and operations — which is the exact category where curiosity reads happen.

What structure changes

"Minimum necessary" stops being a policy promise and becomes an auditable list of specific accesses, labeled by actor, visible to the patient. The next time a hospital employee pulls a celebrity’s chart for curiosity, the celebrity sees it.

Enforcement on record. OCR HIPAA enforcement: hundreds of settlements since 2003, cumulative penalties exceeding $140M. Most high-profile curiosity-read cases never produced a user-visible audit trail — the OCR found out because a human tipped them off.

🇺🇸

HIPAA Security Rule

Health Insurance Portability and Accountability Act · Security Rule

Healthcare / ePHIUnited States

45 CFR §164.312(b) — Audit controls

Standard: Audit controls. Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information.

Why it cannot be verified

The entire rule is a directive to the covered entity to record-and-examine its own systems. The patient is not a party to the examination. The mechanisms are implemented in software the covered entity controls, reviewed by staff the covered entity employs, and kept in storage the covered entity can reach with `DELETE FROM audit_log`.

What structure changes

The mechanism is on the wire path, not in the application. The storage is cryptographically chained, not a row in a table the DBA can edit. The examiner is the patient, not the compliance officer.

🇺🇸

HITECH

Health Information Technology for Economic and Clinical Health Act · Breach notification

Healthcare / ePHIUnited States

45 CFR §164.408(c) — Notification to the Secretary

A covered entity shall, following the discovery of a breach of unsecured protected health information… notify the Secretary… If a breach involves less than 500 individuals, the covered entity… shall maintain a log or other documentation of such breaches.

Why it cannot be verified

HITECH does not add any real-time logging requirement visible to the patient. "Discovery" is a trigger event defined by the covered entity’s own detection pipeline — and if the pipeline never detects the access, there is no discovery, no breach, no notification, and no patient ever learns their record was read.

What structure changes

Discovery stops being an internal event. Every access is on the chain at the moment it happens, and the patient can see it without waiting for the covered entity’s detection pipeline to notice.

🇺🇸

42 CFR Part 2

Confidentiality of Substance Use Disorder Patient Records · 42 CFR Part 2

Substance use recordsUnited States

42 CFR §2.16 — Security for records

The Part 2 program or other lawful holder of patient identifying information must have in place formal policies and procedures to reasonably protect against unauthorized uses and disclosures of patient identifying information and to protect against reasonably anticipated threats or hazards to the security of patient identifying information.

Note. 42 CFR Part 2 is the strictest federal privacy rule in the United States — substance use disorder records cannot even be disclosed to other healthcare providers without explicit patient consent, in contrast to HIPAA’s treatment-payment-operations exception.

Why it cannot be verified

"Formal policies and procedures" is the entire protection the rule offers. These policies are written by the Part 2 program, reviewed by the Part 2 program, and audited by the Part 2 program. For the most stigmatized category of health records in the US federal system, the patient has no means to verify whether the policy was followed on any specific access.

What structure changes

Substance use records are the strongest case for structural, not procedural, trust. The chain is visible to the patient the same way it’s visible for any other record — and the patient’s consent to disclosure becomes an event on the chain, not a form in a folder.

Finance & payments

Finance & payments

Banking, payments, and financial services carry some of the world’s oldest access-control regulations. In every case the access log is kept by the institution, reviewed by auditors under NDA, and never shown to the account holder.

🇺🇸

GLBA

Gramm-Leach-Bliley Act · Safeguards Rule

Banking / consumer financeUnited States

16 CFR §314.4(c)(1) — Access controls

Implement and periodically review access controls, including technical and, as appropriate, physical controls to… authenticate and permit access only to authorized users to protect against the unauthorized acquisition of customer information…

Why it cannot be verified

The financial institution decides who its "authorized users" are, maintains the authentication mechanism, and keeps the access logs internal. GLBA grants the customer no inspection right over access records — the customer sees statements and transactions, never the employee access log behind them.

What structure changes

The customer’s ledger gains a second column: not just "what did my money do" but "who at the bank looked at it, and when." The bank’s existing anti-fraud infrastructure works unchanged; the chain runs in parallel.

🌐

PCI DSS

Payment Card Industry Data Security Standard · v4.0 · Requirements 7 and 10

Payments / cardholder dataGlobal (framework)

Req. 7.1 — Need-to-know access / Req. 10 — Monitor access

Processes and mechanisms for restricting access to system components and cardholder data by business need to know are defined and understood… Log and monitor all access to system components and cardholder data.

Note. PCI DSS v4.0 is distributed as a click-through-licensed PDF — deep links into the full text are not supported. The verbatim sentences above are from Requirements 7.1 and 10 as published in the official v4.0 specification. PCI DSS is administered by the PCI Security Standards Council, a consortium of the major card networks, and assessed by a Qualified Security Assessor under NDA.

Why it cannot be verified

"Business need to know" is defined by the merchant, reviewed by the QSA, and documented in a Report on Compliance the cardholder never sees. The Req. 10 logging happens inside the merchant’s own monitoring stack; no provision routes any of it to the actual cardholder.

What structure changes

The cardholder is the party with the strongest interest in audit transparency and the weakest standing in every existing framework. The chain inverts that: "your card was touched at 14:32 by the fraud review team" is a line the cardholder can read.

🇺🇸

NYDFS Part 500

New York Department of Financial Services · Cybersecurity Regulation · 23 NYCRR Part 500

Financial servicesNew York State, USA

23 NYCRR §500.7 — Access privileges (as amended 2023)

limit user access privileges to information systems that provide access to nonpublic information to only those necessary to perform the user’s job… periodically, but at a minimum annually, review all user access privileges and remove or disable accounts and access that are no longer necessary.

Note. Text shown is the amended version from the Nov 2023 rule change, which took full effect May 1, 2025. The original 2017 rule had less specific language; the amendment tightened it.

Why it cannot be verified

"Only those necessary" is defined by the covered entity’s own risk assessment, reviewed internally, reported to NYDFS, and never shared with the consumer whose nonpublic information is at stake.

What structure changes

New York’s regulation comes the closest to using the exact language our manifesto argues is structurally unverifiable. We make the same sentence structural: "only those necessary" becomes "only those who showed up on the chain," and the list is visible to the customer.

🇪🇺

DORA

Digital Operational Resilience Act · Regulation (EU) 2022/2554

Financial servicesEuropean Union

Article 9(4)(c) — Protection and prevention

implement policies that limit the physical or logical access to information assets and ICT assets to what is required for legitimate and approved functions and activities only, and establish to that end a set of policies, procedures and controls that address access rights and ensure a sound administration thereof.

Note. DORA entered into application on 17 January 2025 and is the newest major financial-sector regulation in Europe. "Legitimate" here rhymes exactly with FERPA’s "legitimate educational interest" — two regulations, four decades apart, two continents, same load-bearing word.

Why it cannot be verified

"Legitimate and approved" is decided by the financial entity, reviewed by its own ICT function, and reported to the European Supervisory Authorities. The customer whose data is the subject of the access never sees any of the three.

What structure changes

"Legitimate" becomes a column on the chain — labeled by the actor, visible to the customer, verifiable in WASM. The same word, made structural instead of aspirational.

Education

Education

FERPA is the oldest "authorized personnel" clause in US federal law. The universities that enforce it know the clause is aspirational — which is why three of them have added a line to their own notices that reads like a confession.

🇺🇸

FERPA

Family Educational Rights and Privacy Act · 34 CFR Part 99

Education recordsUnited States

34 CFR §99.31(a)(1)(i)(A) — Legitimate educational interest

The disclosure is to other school officials, including teachers, within the agency or institution whom the agency or institution has determined to have legitimate educational interests.

Note. The school is the sole arbiter of which of its employees has a "legitimate educational interest." The student has no access log to challenge the determination — and universities across the US know this, which is why three of them have added a line to their own notices that reads like a confession. See the pull quote below.

Why it cannot be verified

"Legitimate" is an adjective the school itself applies to its own staff. If a professor pulls a student’s transcript in March, FERPA does not give the student the ability to ask why, when, or even whether. The record exists; the student does not see it.

What structure changes

Every record access is on a chain visible to the student. If the access was legitimate, the record shows the actor and the actor’s stated reason; if it wasn’t, the student finds out the same day, not three years later during a news cycle.

When the admin isn’t human

AI accountability

The EU AI Act is the first regulation that writes the "authorized personnel" clause for autonomous systems. Article 12 requires automatic tamper-evident logging of high-risk AI operations; Article 19 mandates that the logs be kept for at least six months. Full application is August 2, 2026. Every major AI vendor will need to produce this evidence on demand — and the current answer is pgaudit plus an ELK stack plus a compliance attestation nobody outside the company can verify.

🇪🇺

EU AI Act

EU Artificial Intelligence Act · Regulation (EU) 2024/1689

High-risk AI systemsEuropean Union

Article 12(1) — Record-keeping

High-risk AI systems shall technically allow for the automatic recording of events (logs) over the lifetime of the system.

Note. The Article 12 text is short because it is the stake in the ground — the *automatic* qualifier is the load-bearing word. A log written by software that can be disabled by the same team being audited is not "automatic" in any meaningful sense. Full application for high-risk AI systems is August 2, 2026; penalties for record-keeping failures reach €15M or 3% of global annual turnover, whichever is higher (Article 99).

Why it cannot be verified

The regulation mandates the existence of logs but does not specify a structural property that makes them tamper-evident to anyone outside the provider. A provider who runs pgaudit into a Splunk instance they control, and attests to a notified body that the logs are "complete," satisfies the letter of Article 12 while leaving the substance structurally unverifiable — exactly the gap Article 99 penalties are designed to push providers past, but there is no reference infrastructure that closes it.

What structure changes

The per-user Merkle chain and its client-side WASM verifier are a literal implementation of "automatic recording of events" — automatic because the proxy intercepts wire-protocol traffic regardless of operator cooperation, tamper-evident because each entry is cryptographically chained to the previous one, and user-verifiable because the affected data subject runs the verifier on their own machine. Article 12 asks for a log. We make the log a structural property of the deployment topology.

Enforcement on record. Article 99(5): non-compliance with record-keeping obligations triggers administrative fines up to €15M or 3% of total worldwide annual turnover for the preceding financial year, whichever is higher. Full application for high-risk AI systems: August 2, 2026.

🇪🇺

EU AI Act

EU Artificial Intelligence Act · Regulation (EU) 2024/1689

High-risk AI systemsEuropean Union

Article 19(1) — Automatically generated logs

Providers of high-risk AI systems shall keep the logs referred to in Article 12(1), automatically generated by their high-risk AI systems, to the extent such logs are under their control, for a period appropriate to the intended purpose of the high-risk AI system, of at least six months, unless provided otherwise in the applicable Union or national law.

Note. Article 19 is the retention counterpart to Article 12 — the two must be read together. Article 12 creates the logging obligation; Article 19 forbids the provider from throwing the logs away for at least six months. "Under their control" is doing load-bearing work: it excludes logs a deployer generated on their own infrastructure, but includes everything a provider touches as part of operating the system.

Why it cannot be verified

The six-month retention window is a floor, not a verification mechanism. A provider can honestly keep the logs for six months and still structure them so that neither the affected data subject nor a notified body can detect tampering within the retention window. "Kept" and "kept and verifiable" are not the same property, and Article 19 requires only the first.

What structure changes

Merkle chains are tamper-evident by construction — modifying any entry breaks every entry after it, detectable in a single pass. The client-side WASM verifier runs on the affected data subject’s machine, which means the six-month retention window becomes six months of independently verifiable evidence instead of six months of material the provider can quietly sanitize.

Enforcement on record. Same Article 99(5) ceiling as Article 12: up to €15M or 3% of global annual turnover. Financial-sector providers (Article 19(2)) may satisfy the obligation by keeping logs as part of documentation already kept under Union financial services law.

The confession

Three universities already admit the FERPA clause is aspirational.

The strongest evidence that “limit access to authorized personnel with a legitimate interest” is structurally unverifiable is that the institutions enforcing it have explicitly written into their own FERPA notices that curiosity is not a legitimate interest — a disclaimer they only added because they know staff curiosity happens often enough to warrant calling it out. Three independent .edu pages, same admission.

What to do with this

The clause has been written into every privacy policy on earth because there was no alternative to write instead.

There is now. Every access to user data — human admin, AI agent, automated pipeline — lands in a per-user cryptographic chain the affected person verifies in their own browser, client-side in WASM. The regulator’s sentence stays the same. The evidence under it stops being a policy and starts being a hash. The gap between what the policy promises and what the architecture enforces closes for the first time since 1974.

Verification

All verbatim quotes above were last verified against their primary-source URLs on 2026-04-13. W3C Text Fragments are supported in Chrome, Edge, Safari, and Opera; Firefox requires enabling dom.text_fragments.enabled in about:config. If a text fragment fails to highlight on the destination page — which can happen when a regulator updates their HTML — the link still loads the source document and the quote can be found with Ctrl-F using the snippets shown above. PDFs (AICPA SOC 2, PCI DSS, NYDFS amendment) do not support text fragments; links to those sources land on the document and the reader must page to the referenced section.

ISO/IEC 27001:2022 is not included on this page because its text is paywalled and cannot be cited to a free primary source. The SOC 2 entry covers the same structural register.