<\!DOCTYPE html> <\!-- medical-trust.html — Medical Vertical Trust Center Owns: HIPAA safeguard documentation, PHI control descriptions, FDA SaMD boundary policy, WORM audit trail demo, BAA/compliance document links for medical vertical. Does NOT own: financial compliance (trust.html), legal vertical (legal.html), SOC 2 / SEC 17a-4 certifications (trust.html), general platform docs. Route: /medical/trust Last updated: 2026-05-15 --> Medical Trust Center — Sturna | HIPAA · FDA SaMD · 21 CFR Part 11 · BAA <\!-- NAV --> <\!-- HERO -->
Medical Trust Center — Live

Every HIPAA safeguard, every PHI control, every audit entry —
cryptographically verifiable. Not because we say so.

Sturna enforces HIPAA Security Rule safeguards, FDA SaMD boundaries, and 21 CFR Part 11 WORM audit requirements at the infrastructure layer — not the policy layer. BAA executed before the first query. PHI tokenized before any agent receives your prompt.

OCR Enforcement Ready
HIPAA Security Rule
21 CFR Part 11
FDA SaMD-Aware
BAA-Ready

OCR enforcement actions are up 340% since 2020. The average resolution agreement now carries $3.2M in penalties. Old BAA frameworks don't cover AI vendor inference — they were written before LLMs processed PHI at query time. Sturna closes that gap architecturally, not contractually.

<\!-- SECTION 1: HIPAA SAFEGUARDS GRID -->

HIPAA Safeguards Grid

Six required safeguard categories, each mapped to a named control, an architecture component, and an active audit trail. Not a checklist — a running system.

🏛️
45 CFR §164.308

Administrative Safeguards

Documented security officer designation with named control owner. Workforce training records captured per HIPAA §164.308(a)(5). Annual risk analysis completed and version-controlled. Incident response plan tested against OCR breach notification timelines. Every administrative safeguard maps to a named owner — not a team, a person.

🔒
45 CFR §164.312(a)(2)(iv)

PHI Detection & Tokenization

MARCH Gate 1 scans every inbound intent for 18 PHI pattern categories: name+DOB combinations, MRN, SSN, insurance ID, diagnosis codes (ICD-10), NPI numbers, geographic identifiers at sub-state granularity, and 10 additional Safe Harbor categories. PHI is tokenized before any agent receives the prompt. Tokens are reversible only within the session, per-tenant, with full audit trail on every reversal.

📋
45 CFR §164.314

BAA Framework

Business Associate Agreement executed before the first query — enforced as an architectural hard block, not a policy reminder. Subprocessor chain documented and updated on every provider change. AI inference vendors (all LLM providers in the pipeline) are covered under BAA. No PHI flows to any subprocessor without a signed agreement in the chain. The block is at the routing layer, not the terms of service layer.

🚨
HITECH §13402 · 45 CFR §164.400

Breach Notification Readiness

60-day HHS OCR reporting timeline is tracked from automated incident detection, not from manual discovery. Breach notification workflow is documented and templated: affected-individual identification → HHS report generation → media notification trigger (if 500+ affected individuals in a single state). All detection and notification timestamps are written to the WORM audit log — immutable from the moment of detection.

📝
21 CFR Part 11.10(e)

Audit Log — 21 CFR Part 11 WORM

Every audit entry is HMAC-SHA256 signed at write time. PL/pgSQL triggers block UPDATE and DELETE at the database layer — no application-side code path can mutate an existing entry. Every PHI access event, agent invocation, MARCH gate verdict, and transparency card issuance is recorded. The full audit log is exportable in OCR-auditable format on request, with cryptographic chain-of-custody intact.

🔑
45 CFR §164.514(d)

Access Controls — Minimum Necessary

Role-based access is enforced per the HIPAA minimum necessary standard — each role carries a defined PHI scope. The access audit log captures every PHI read with requestor identity, timestamp, access purpose, and data category accessed. Emergency access procedures are documented with break-glass audit trail: break-glass events trigger immediate supervisor notification and are written to the WORM log before access is granted.

<\!-- SECTION 2: FDA SaMD PANEL -->

FDA SaMD Boundary Enforcement

The routing layer enforces FDA's Software as a Medical Device (SaMD) boundaries before any agent responds. Intents that cross the clinical decision support line are flagged, not softened.

Pre-Response Routing Gate

IMDRF SaMD N10 · FDA AI/ML Action Plan 2021

Clinical decision support intents — diagnosis suggestion, treatment recommendation, drug dosing calculation — are detected at the intent routing layer using a dedicated SaMD classifier agent. Intents that cross the SaMD boundary receive a mandatory regulatory disclosure before any substantive response is generated. The disclosure is logged, timestamped, and appended to the session audit record. The classifier runs before any specialist agent sees the input, not after.

510(k) Exemption Scope Verification

21 CFR 880.6310 · FDA CDS Guidance 2022

Intents that involve functionality within a cleared SaMD's 510(k) exemption scope are validated against that scope at the routing layer. Functionality that falls outside the cleared scope — even when the intent appears adjacent to cleared use — triggers a hard block. The response is not softened or hedged: the agent returns a scope violation notice with the applicable 510(k) predicate reference. There is no path to generating an out-of-scope clinical output through ambiguous framing.

EU MDR Article 22 Assessment

EU MDR 2017/745 Article 22 · MDCG 2019-11

Digital health tools deployed for EU-market organizations are assessed against EU MDR Article 22 standalone software classification criteria at onboarding. Tools that meet standalone software classification thresholds are flagged as candidate medical devices and trigger additional gate validation for every intent. Classification assessment is documented, version-controlled, and updated on material platform changes. MDCG 2019-11 qualification and classification guidance is the reference standard for the assessment.

<\!-- SECTION 3: AUDIT TRAIL LIVE DEMO -->

HIPAA Audit Trail — Live

Every PHI access, agent invocation, and gate verdict. HMAC-SHA256 signed at write time. Immutable at the database layer. Exportable for OCR audits on demand.

compliance_audit_log — WORM · read-only view · session: phi-intent-4d9f2a
Timestamp (UTC) Event Type Agent Gate PHI Detected HMAC Status
2026-05-15 04:07:12 PHI_SCAN_TRIGGERED medical-auditor-3 MARCH-G1 Yes (MRN+DOB) ✓ VALID
2026-05-15 04:07:12 PHI_TOKENIZED tokenizer-v2 MARCH-G1 ✓ VALID
2026-05-15 04:07:13 SAMD_BOUNDARY_CHECK samd-classifier MARCH-G2 ✓ VALID
2026-05-15 04:07:14 RESPONSE_GROUNDED medical-auditor-3 MARCH-G3 No ✓ VALID
2026-05-15 04:07:14 TRANSPARENCY_CARD audit-logger POST-MARCH ✓ VALID
2026-05-15 04:07:14 AUDIT_ENTRY_APPENDED worm-logger WORM ✓ SIGNED
<\!-- SECTION 4: COMPLIANCE BADGES -->

Healthcare Compliance Certifications

Status indicators reflect current platform state. Amber indicates active preparation with a defined delivery milestone.

HIPAA Security Rule

Active
45 CFR Part 164

Administrative, physical, and technical safeguards implemented and mapped to named control owners. Annual risk analysis current.

HITECH Breach Notification

Active
HITECH §13402 · 60-day reporting ready

Automated breach detection from WORM audit log anomalies. 60-day HHS OCR reporting timeline tracked from detection timestamp.

21 CFR Part 11

Active
WORM audit · Electronic signatures

HMAC-SHA256 signed audit log. PL/pgSQL-level UPDATE/DELETE blocks. Electronic record integrity verifiable on export.

FDA SaMD Framework

Active
IMDRF N10 · AI/ML Action Plan

SaMD boundary classifier runs at the routing layer. Clinical decision support intents flagged before agent response. 510(k) scope verification active.

OCR Enforcement Ready

Active
Resolution agreement documentation

OCR audit package preparation: 30-day delivery SLA. Resolution agreement documentation template maintained and version-controlled.

EU AI Act — Healthcare

In Preparation
Articles 12/14/15 · Enforcement Aug 2026

High-risk AI classification under Annex III. Technical documentation, human oversight controls, and conformity assessment in progress ahead of Aug 2026 enforcement.

<\!-- SECTION 5: COMPLIANCE DOCUMENTS -->

Compliance Documents

All compliance documentation is available to pilot participants and prospective covered entities. BAA execution is required before first query — not after onboarding.

📄

BAA Template

Business Associate Agreement template covering AI inference, PHI tokenization, subprocessor chain, and breach notification obligations. Executed before first query.

Request Template →
🔐

Healthcare DPA

Data Processing Agreement covering lawful bases for PHI processing, data minimization controls, retention schedules, and cross-border transfer safeguards.

Request DPA →
📊

OCR Audit Package

30-day delivery SLA. Includes: full WORM audit log export, risk analysis documentation, workforce training records, and breach notification procedure evidence.

Request Package →
📋

PHI Handling Policy

Full PHI lifecycle documentation: detection patterns, tokenization scheme, retention limits, access controls, destruction procedures, and audit trail format specification.

Request Policy →
<\!-- FOOTER --> <\!-- EMAIL MODAL -->