Home / Compliance
🔒 Regulatory Compliance

Built for Global Regulatory Environments

Most platforms bolt on compliance after the fact. Kura's architecture provides the technical controls that regulations demand — immutability, encryption, verifiability, and chain of custody — by default.

GDPR HIPAA PDPA eIDAS FRE 901 C2PA ISO 27037 EU AI Act
Core Properties

Four Properties That Regulators Care About

Every Kura record is built on four architectural properties that map directly to what compliance frameworks require.

🔒

Immutability

Your actual media files are stored across Kura's decentralised infrastructure — not on a traditional cloud server. Once stored, records cannot be altered, deleted, or backdated by anyone, including Kura.

Verifiability

Anyone can independently verify a record's authenticity through a one-click public verification link. No account, software, or trust in Kura required.

🔐

Privacy

Media is encrypted client-side using vetKeys threshold encryption before it ever leaves the device. The encrypted file is then stored on Kura's decentralised infrastructure — not on a third-party server. Not even Kura can access the plaintext.

🔗

Chain of Custody

A cryptographic audit trail tracks every action — capture, upload, access, share — with identity-linked timestamps. The chain is unbreakable and independently auditable.

Regulatory Mapping

One Architecture, Every Jurisdiction

Kura's technical controls address regulatory requirements across 30+ countries — from GDPR in Europe to PDPA in Thailand to DPDP in India. One platform, global compliance coverage.

Regulation Region Reference Requirement How Kura's Architecture Addresses This
GDPR EU Art. 17 Right to erasure ("right to be forgotten") Kura supports erasure through crypto-shredding — destroying the encryption key renders stored data permanently inaccessible. The blockchain anchor (hash only) contains no personal data. This is the approach recognised by privacy professionals for immutable storage systems.
GDPR EU Art. 25 Data protection by design and by default Technical controls enable privacy by design: client-side vetKeys encryption ensures data is protected before it enters the system, not after.
HIPAA US §164.312 Technical safeguards for electronic protected health information Architecture aligns with HIPAA technical safeguard requirements: end-to-end encryption, access controls, and immutable audit logs for all data interactions.
FRE US Rule 901(a) Authentication of evidence — proof that evidence is what it claims to be Kura provides cryptographic proof of authenticity: SHA-256 hash, blockchain timestamp, identity-linked capture, and an unbroken chain of custody from moment of capture.
FRE US Rules 1001-1004 Best evidence rule — original or reliable duplicate required Kura provides the cryptographic original: the blockchain-anchored hash proves bit-for-bit integrity. The verification link lets any party confirm the record is unmodified.
eIDAS EU Art. 41 Legal effect of electronic timestamps Kura implements blockchain consensus timestamps that provide independent, tamper-proof time attestation — meeting the technical requirements for qualified electronic timestamps.
SOC 2 US CC6.1 Logical and physical access controls Architecture supports SOC 2 control objectives: principal-based access control, encrypted storage, and cryptographic audit trails for every data access event.
ISO 27001 Global A.12 Operations security — logging and monitoring Architecture aligns with ISO 27001 operational security controls: immutable on-chain audit logs, automated integrity verification, and tamper-evident record keeping.
CCPA US (CA) §1798.105 Right to deletion of personal information Kura's architecture supports deletion through crypto-shredding — destroying the encryption key renders stored data permanently inaccessible while preserving non-personal blockchain anchors.
FADP Switzerland Art. 6 Data protection principles including data minimization Technical controls enable data minimization: only cryptographic hashes are stored on-chain; encrypted media is stored separately with granular access controls.
NIST 800-53 US AU-10 Non-repudiation — protection against false denial of actions Architecture aligns with NIST non-repudiation controls: identity-linked captures, cryptographic signatures, and immutable blockchain records prevent denial of evidence creation.
PIPEDA Canada Principle 7 Safeguards — security appropriate to sensitivity of data Kura's architecture supports PIPEDA safeguard requirements: threshold encryption, blockchain immutability, and identity verification proportionate to data sensitivity.
C2PA Global Spec 1.x Content provenance and authenticity standard Kura implements provenance tracking that exceeds C2PA requirements: cryptographic hashing, identity binding, immutable timestamps, and a publicly verifiable audit trail.
IPTC Global Photo Metadata Standardized metadata for media identification and rights Kura implements structured metadata capture: identity, timestamp, claimed GPS, device info, and cryptographic signatures — all anchored to an immutable record.
EXIF Integrity Global N/A Protection against metadata tampering Kura provides EXIF integrity by design: metadata is captured at the moment of recording and hashed into the blockchain anchor, making post-capture tampering cryptographically detectable.
PDPA Thailand Sec. 37 Data protection and right to erasure Kura's architecture supports PDPA requirements through crypto-shredding for erasure, client-side encryption for data protection, and immutable audit logs for accountability.
DPDP Act India Sec. 8-12 Obligations of data fiduciaries including security safeguards Architecture supports DPDP security obligations: threshold encryption, decentralised storage with no single-provider dependency, and granular consent-based access controls.
PDPL Vietnam Art. 26 Data protection and processing requirements Technical controls support PDPL requirements: encrypted storage, identity-verified access, and crypto-shredding for data deletion requests.
PDP Law Indonesia Art. 16 Personal data protection and security measures Architecture supports PDP Law safeguard requirements: end-to-end encryption, immutable audit trails, and decentralised storage that eliminates single-provider risk.
PDPL Saudi Arabia Art. 10 Data security and protection obligations Kura's architecture supports PDPL security requirements: client-side encryption before storage, cryptographic access controls, and tamper-evident record keeping.
PDPL UAE Art. 28 Technical and organisational security measures Architecture supports UAE PDPL through threshold encryption, decentralised infrastructure with no single point of compromise, and immutable audit logs.
EU e-Evidence Reg. EU 2023/1543 Cross-border electronic evidence preservation and production (effective Aug 2026) Kura provides tamper-proof evidence preservation with cryptographic chain of custody — directly addressing e-Evidence requirements for cross-border digital evidence integrity.
EU AI Act EU Art. 50 Transparency obligations for AI-generated content (effective Aug 2026) Kura provides provenance proof that media is human-captured, not AI-generated — addressing AI Act transparency requirements with cryptographic identity binding and capture-time verification.
ISO 27037 Global Sec. 7 Guidelines for identification, collection, and preservation of digital evidence Kura implements ISO 27037 principles: evidence integrity through cryptographic hashing, documented chain of custody, identity-linked capture, and tamper-evident storage.

Kura provides technical controls that support regulatory compliance. Organizational compliance — policies, audits, and data processing agreements — remains the responsibility of each deploying organization.

Global Coverage

International Standards Coverage

Kura's architecture addresses technical requirements across major regulatory jurisdictions.

Europe & Switzerland

EU Frameworks

  • GDPR — Data protection by design
  • eIDAS — Electronic timestamps
  • EU e-Evidence Reg. — Cross-border evidence
  • EU AI Act — AI content transparency
  • FADP — Swiss data protection
United States

US Frameworks

  • FRE 901 / 1001 — Evidence authentication
  • HIPAA — Protected health information
  • SOC 2 — Trust service criteria
  • CCPA — Consumer privacy rights
Asia-Pacific & Middle East

APAC & MEA Frameworks

  • PDPA — Thailand data protection
  • DPDP Act — India data protection
  • PDPL — Vietnam data protection
  • PDP Law — Indonesia data protection
  • PDPL — Saudi Arabia data protection
  • PDPL — UAE data protection
Global Standards

International

  • ISO 27001 — Information security
  • ISO 27037 — Digital evidence handling
  • NIST 800-53 — Security controls
  • C2PA — Content provenance
  • PIPEDA — Canadian privacy
The Difference

Policy vs Architecture

Most compliance programs rely on policies that people promise to follow. Kura enforces controls at the architecture level.

Policy-Based Compliance

  • Relies on employees following documented rules
  • Audit gaps between periodic reviews
  • Files stored on cloud servers controlled by a single company
  • Chain of custody maintained by manual logs
  • Encryption applied inconsistently across workflows

Architecture-Based Controls (Kura)

  • Immutability enforced by blockchain — no human override
  • Continuous cryptographic verification, not periodic audits
  • Files stored on decentralised infrastructure — no single-provider dependency
  • Chain of custody is a cryptographic audit trail, not a spreadsheet
  • Client-side encryption by default on every record
Kura's architecture enforces technical controls automatically. Your organization provides the policies, agreements, and governance that complete the compliance picture.

Ready to Build on a Compliant Foundation?

Kura's architecture provides the technical controls your compliance team needs. Start certifying media today.

Get Started Read the Litepaper
Get Started