Data protection
Hyponema is built around tenant-scoped data access and operational auditability.
Tenant isolation
Section titled “Tenant isolation”Every platform entity is tenant-scoped. Database access sets tenant scope and relies on row-level security to block cross-tenant reads and writes.
Compliance workflows
Section titled “Compliance workflows”Hyponema includes support for DSAR exports, retention purging, fatigue detection windows, audit logs, and provider credential encryption. See Compliance and access control for the operator-facing flows.
Public documentation boundary
Section titled “Public documentation boundary”The public docs site is separate from the repository’s internal docs/ directory. Internal architecture notes, QA logs, incident runbooks, and business material are not published to docs.hyponema.ai.
Data minimization
Section titled “Data minimization”Use stable application IDs for users and keep personal data in explicit profile fields or product records. Avoid embedding sensitive data into identifiers, dynamic variable names, tool names, or trace tags.