Context and problem framing
Why zero-knowledge matters for HIPAA Under HIPAA's Breach Notification Rule (45 CFR 164.402), encrypted data that meets NIST standards is excluded from breach notification requirements — provided the encryption key was not compromised. Typical operational metadata includes: File/transfer identifiers — IDs used to locate requested data Filename — what you see in the UI File size — for quotas and progress display Expiration & download limits Download counts — for UI and abuse detection We also maintain minimal security telemetry to prevent abuse (such as IP and user-agent in security logs). You can further harden access by: Password protection — require a password before download Zero-knowledge encryption — require the passphrase to decrypt after download Expiration / download caps — limit the window of exposure Rate limiting and abuse controls make large-scale link guessing and scraping noisy and costly.
Security logging To defend the service and investigate abuse, we log security events such as rate limit blocks, authentication events, and suspicious activity. HHS Guidance to Render Unsecured PHI Unusable (74 FR 19006) HIPAA Security Rule — Technical Safeguards The following table maps HIPAA Security Rule requirements (45 CFR 164.312) to FileShot's implementation. Audit Controls 164.312(b) Professional plan includes audit logging: uploads, downloads, deletions, and authentication events are recorded with timestamps.