Runtime Privacy Controls and Audit Evidence
CONSENT ENFORCEMENT AT INFERENCE
Before personalized predictions, check user consent. Query consent service with user_id and purpose. Cache decisions locally (TTL 5-15 minutes) to reduce latency. If revoked or missing, fall back to non-personalized defaults. Log every check for audit.
PURPOSE LIMITATION AT RUNTIME
Data for purpose A cannot be used for purpose B without re-consent. Tag every access with purpose. Feature store returns different sets based on purpose: recommendation features only for purpose=recommendations. Violations trigger alerts and block processing.
IMMUTABLE AUDIT LOGS
Log every privacy action immutably: consent changes, data access, DSAR processing, deletions. Use append-only storage. Include timestamps, actor, action, outcome. Regulators may request logs years later—retention often exceeds data retention.
AUDIT EVIDENCE GENERATION
When regulators inquire, generate reports: consent records, data accesses, DSAR handling with timestamps. Automate—manual compilation takes weeks. Include cryptographic hashes proving log integrity.