Data Governance

Our commitment to responsible data management and regulatory compliance


Data Governance at Ambar Systems

At Ambar Systems, data governance is not a compliance checkbox — it is a core engineering principle. AmbarDigitalHub is designed from the ground up with multi-tenant data isolation, privacy-by-design architecture, and configurable compliance controls that adapt to your organization's regulatory requirements.

This page summarizes our data governance framework, the controls available to Tenant Administrators, and our alignment with major data protection regulations.

Governance Pillars

Data Isolation

Tenant data is logically isolated via per-tenant schemas and connection strings. No cross-tenant data leakage is possible at the application layer.

Privacy by Design

Personal data collection is minimized to what is necessary. Data processing purposes are clearly defined and enforced through role-based access controls.

Audit Trail

All administrative actions, data access events, and configuration changes are logged. Audit logs are immutable and available to Tenant Administrators.

Data Lifecycle

Configurable retention policies, automated data anonymization, and secure deletion workflows ensure data does not persist beyond its useful life.

Regulatory Alignment

Regulation Scope Platform Controls
GDPR
EU General Data Protection Regulation
Personal data of EU/EEA residents
  • Consent management for newsletter & marketing features
  • Data subject access request (DSAR) workflow
  • Right to erasure / data portability via admin tools
  • Data Processing Agreements (DPA) with sub-processors
  • Standard Contractual Clauses for cross-border transfers
CCPA / CPRA
California Consumer Privacy Act
Personal information of California residents
  • Do Not Sell My Personal Information controls
  • Consumer data access and deletion requests
  • Disclosure of data categories collected and shared
FERPA
Family Educational Rights and Privacy Act
Student education records (US)
  • Tenant-level access controls for student records
  • LTI 1.3 launches share only required claims
  • Enrollment and grade data restricted to authorized roles
PCI DSS
Payment Card Industry Data Security Standard
Cardholder data
  • No card numbers stored on platform servers
  • Payments delegated to PCI-certified processors (Stripe, PayPal)
  • Tokenized payment references only
SOC 2 Type II
Service Organization Control
Security, availability, processing integrity
  • Audit logging and monitoring
  • Change management and deployment controls
  • Incident response procedures
  • [Certification in progress — contact us for status]

Controls for Tenant Administrators

User & Role Management
  • Create custom roles with granular permissions
  • Assign module-level access (LmsStudio, CommerceStudio, CrmStudio, etc.)
  • Enable multi-factor authentication (MFA) for admin accounts
  • Configure external identity providers (OIDC, SAML)
Data Retention & Deletion
  • Configure per-entity retention policies
  • Automated anonymization of inactive accounts
  • Bulk data export (JSON/CSV) for portability requests
  • Secure account deletion with 30-day grace period
Audit & Compliance Reporting
  • Searchable audit log of all admin and data access events
  • Exportable compliance reports (enrollment, payment, access)
  • Configurable alerts for unusual access patterns
  • Integration with external SIEM tools via webhook
Encryption & Security
  • TLS 1.2+ for all data in transit
  • AES-256 encryption at rest for databases and backups
  • Tenant-specific encryption keys (available on Enterprise plan)
  • Automatic session timeout and IP-based access restrictions

Platform Data Flow

Simplified data flow through the AmbarDigitalHub platform:

User Browser TLS / CDN API Gateway Microservices Tenant DB
Microservices Stripe / PayPal Microservices LTI 1.3 Tools

All inter-service communication is encrypted. Payment data never touches platform storage.

Incident Response

1
Detect

Automated monitoring detects anomalies and triggers alerts within minutes.

2
Contain

Affected systems are isolated. Tenant data boundaries prevent lateral impact.

3
Remediate

Root cause analysis, patching, and recovery. Affected tenants are notified within 72 hours per GDPR.

4
Review

Post-incident review, process improvement, and updated controls documented.

Data Governance Inquiries

Data Protection Officer

For data governance questions, DSAR requests, or compliance inquiries:

Security Incidents

To report a security vulnerability or data breach:

This page is for informational purposes and does not constitute legal advice. Consult your legal counsel for jurisdiction-specific compliance requirements.