diff --git a/public/about.html b/public/about.html index 80eb72c4..2a0a973d 100644 --- a/public/about.html +++ b/public/about.html @@ -176,6 +176,51 @@ + +
+

Tractatus Data Practices

+
+

+ We practice what we preach—transparent data handling with architectural constraints: +

+
+ +
+
+

What Personal Data?

+

+ Audit logs may contain: usernames, timestamps, session IDs, action descriptions. No tracking cookies, no behavioral profiling, no cross-site data collection. +

+
+ +
+

Why Needed?

+

+ Framework operation requires audit trails for governance decisions. BoundaryEnforcer logs blocked actions, CrossReferenceValidator logs instruction conflicts. +

+
+ +
+

How Long Retained?

+

+ Configurable retention (default 90 days). Organizations can set retention based on their compliance requirements. +

+
+ +
+

Your Rights (GDPR)

+

+ Access (Article 15), Deletion (Article 17), Portability (Article 20). + Contact: john.stroh.nz@pm.me +

+
+
+ +

+ Architectural principle: Data minimization is a system constraint, not a policy hope. BoundaryEnforcer prevents PII exposure structurally—audit trails provide compliance evidence. +

+
+

How It Works

diff --git a/public/locales/de/about.json b/public/locales/de/about.json index 75b25f91..2e4925cd 100644 --- a/public/locales/de/about.json +++ b/public/locales/de/about.json @@ -43,6 +43,20 @@ "read_more_link": "Lesen Sie unseren vollständigen Ansatz zu Te Tiriti und indigener Datensouveränität →" } }, + "data_practices": { + "heading": "Tractatus-Datenpraktiken", + "intro": "Wir praktizieren, was wir predigen – transparenter Datenumgang mit architektonischen Beschränkungen:", + "what_data_title": "Welche personenbezogenen Daten?", + "what_data_desc": "Audit-Protokolle können enthalten: Benutzernamen, Zeitstempel, Sitzungs-IDs, Aktionsbeschreibungen. Keine Tracking-Cookies, keine Verhaltensprofilierung, keine Cross-Site-Datenerfassung.", + "why_needed_title": "Warum benötigt?", + "why_needed_desc": "Der Framework-Betrieb erfordert Audit-Trails für Governance-Entscheidungen. BoundaryEnforcer protokolliert blockierte Aktionen, CrossReferenceValidator protokolliert Anweisungskonflikte.", + "retention_title": "Wie lange aufbewahrt?", + "retention_desc": "Konfigurierbare Aufbewahrung (Standard 90 Tage). Organisationen können die Aufbewahrung basierend auf ihren Compliance-Anforderungen festlegen.", + "rights_title": "Ihre Rechte (DSGVO)", + "rights_desc": "Zugang (Artikel 15), Löschung (Artikel 17), Übertragbarkeit (Artikel 20).", + "contact_email": "john.stroh.nz@pm.me", + "architectural_note": "Architektonisches Prinzip: Datenminimierung ist eine Systembeschränkung, keine Richtlinienhoffnung. BoundaryEnforcer verhindert strukturell die Offenlegung von personenbezogenen Daten – Audit-Trails liefern Compliance-Nachweise." + }, "how_it_works": { "heading": "Wie es funktioniert", "intro": "Das Tractatus-Framework besteht aus fünf integrierten Komponenten, die zusammenarbeiten, um strukturelle Sicherheit durchzusetzen:", diff --git a/public/locales/en/about.json b/public/locales/en/about.json index a4475259..74305dba 100644 --- a/public/locales/en/about.json +++ b/public/locales/en/about.json @@ -50,6 +50,20 @@ "read_more_link": "Read our complete approach to Te Tiriti and indigenous data sovereignty →" } }, + "data_practices": { + "heading": "Tractatus Data Practices", + "intro": "We practice what we preach—transparent data handling with architectural constraints:", + "what_data_title": "What Personal Data?", + "what_data_desc": "Audit logs may contain: usernames, timestamps, session IDs, action descriptions. No tracking cookies, no behavioral profiling, no cross-site data collection.", + "why_needed_title": "Why Needed?", + "why_needed_desc": "Framework operation requires audit trails for governance decisions. BoundaryEnforcer logs blocked actions, CrossReferenceValidator logs instruction conflicts.", + "retention_title": "How Long Retained?", + "retention_desc": "Configurable retention (default 90 days). Organizations can set retention based on their compliance requirements.", + "rights_title": "Your Rights (GDPR)", + "rights_desc": "Access (Article 15), Deletion (Article 17), Portability (Article 20).", + "contact_email": "john.stroh.nz@pm.me", + "architectural_note": "Architectural principle: Data minimization is a system constraint, not a policy hope. BoundaryEnforcer prevents PII exposure structurally—audit trails provide compliance evidence." + }, "how_it_works": { "heading": "How It Works", "intro": "The Tractatus Framework consists of six integrated components that work together to enforce structural safety:", diff --git a/public/locales/fr/about.json b/public/locales/fr/about.json index 2bf53932..c9a36237 100644 --- a/public/locales/fr/about.json +++ b/public/locales/fr/about.json @@ -43,6 +43,20 @@ "read_more_link": "Lire notre approche complète de Te Tiriti et de la souveraineté des données des populations autochtones →" } }, + "data_practices": { + "heading": "Pratiques de données Tractatus", + "intro": "Nous pratiquons ce que nous prêchons — traitement transparent des données avec des contraintes architecturales :", + "what_data_title": "Quelles données personnelles ?", + "what_data_desc": "Les journaux d'audit peuvent contenir : noms d'utilisateur, horodatages, ID de session, descriptions d'actions. Pas de cookies de suivi, pas de profilage comportemental, pas de collecte de données intersites.", + "why_needed_title": "Pourquoi nécessaire ?", + "why_needed_desc": "Le fonctionnement du framework nécessite des pistes d'audit pour les décisions de gouvernance. BoundaryEnforcer enregistre les actions bloquées, CrossReferenceValidator enregistre les conflits d'instructions.", + "retention_title": "Combien de temps conservé ?", + "retention_desc": "Rétention configurable (par défaut 90 jours). Les organisations peuvent définir la rétention en fonction de leurs exigences de conformité.", + "rights_title": "Vos droits (RGPD)", + "rights_desc": "Accès (Article 15), Suppression (Article 17), Portabilité (Article 20).", + "contact_email": "john.stroh.nz@pm.me", + "architectural_note": "Principe architectural : La minimisation des données est une contrainte système, pas un espoir de politique. BoundaryEnforcer empêche structurellement l'exposition des DCP — les pistes d'audit fournissent des preuves de conformité." + }, "how_it_works": { "heading": "Comment Ça Fonctionne", "intro": "Le Cadre Tractatus se compose de cinq composants intégrés qui travaillent ensemble pour appliquer la sécurité structurelle :",