Horizons: The OmniChat

A flexible and powerful chatbot platform that brings enterprise-grade LLM capabilities to your infrastructure.

View project on GitHub

Privacy Guide

Overview

Horizons OmniChat is designed with privacy-by-design principles, ensuring data protection across all deployment modes while maintaining compliance with privacy regulations.

Data Handling

Data Collection

User Data

System Data

Data Storage Locations

Deployment Mode Chat Data Model Data System Logs
Local Local PostgreSQL Local filesystem Local logs
Hybrid Local PostgreSQL Local + AWS Bedrock Local + CloudWatch
AWS RDS (encrypted) EFS + Bedrock CloudWatch

Data Protection Measures

1. Data at Rest

Local/Hybrid Mode

Database:
  - PostgreSQL local
  - Volume local

File System:
  - Model file local
  - Configuration local

AWS Mode

Database:
  - RDS encryption (AWS KMS)
  - Automated backups
  - Point-in-time recovery

Storage:
  - EFS encryption
  - S3 encryption
  - Secret Manager integration

2. Data in Transit

3. Data Access Controls

graph TD
    A[User Request] --> B[Authentication]
    B --> C[Authorization]
    C --> D[Data Access Layer]
    D --> E[Encryption Layer]
    E --> F[Storage]

Data Lifecycle

1. Collection

2. Processing

3. Retention

4. Deletion

Privacy Features

1. User Controls

2. Administrative Controls

3. Technical Controls

Compliance Features

GDPR Compliance

Data Subject Rights

Implementation

Access Request:
  - Self-service portal
  - API endpoints
  - Admin interface

Data Export:
  - JSON format
  - CSV format
  - Complete history

Data Processing Records

Processing Activities

Documentation

Privacy by Default Settings

New Deployments

Default Configuration:
  - Minimal data collection
  - Encrypted storage
  - Limited retention
  - Secure communications

User Settings

Initial Settings:
  - Essential cookies only
  - Minimal logging
  - Local processing preferred
  - No analytics sharing

Data Transfer

Cross-Border Considerations

Local/Hybrid Mode

AWS Mode

Incident Response

Privacy Breach Protocol

  1. Detection
    • Automated monitoring
    • User reports
    • System alerts
    • Audit reviews
  2. Assessment
    • Impact evaluation
    • Scope determination
    • Risk assessment
    • Notification requirements
  3. Response
    • Containment measures
    • Communication plan
    • Remediation steps
    • Documentation
  4. Recovery
    • System restoration
    • Data recovery
    • Control updates
    • Process improvement

Next Steps

  1. Review Security Architecture
  2. Configure Data Protection
  3. Implement Compliance Controls
  4. Set up Monitoring

Horizons OmniChat by evereven