9. Compliance Mapping
| Standard | How it is followed |
|---|---|
| IAEA ISMS AM.IV/3 | Data anonymized before upload, encrypted storage and audit logs. |
| GDPR Article 32 | Data protected by design and by encryption. |
| DICOM PS3.15 Annex E | Used as reference for confidentiality tags. |
| UNICC Security Policy | System under DevSecOps control with CloudWatch and audit. |