Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.rootkey.ai/llms.txt

Use this file to discover all available pages before exploring further.

The Problem

Healthcare and life sciences organisations operate under some of the most demanding data integrity requirements of any sector. Clinical trial data must be protected against manipulation - a falsified trial record can affect regulatory approval, patient safety, and public trust. Patient records must be accurate and auditable. Post-market surveillance data must be reliable enough to detect safety signals. The consequences of compromised data integrity in this sector are not financial - they are human. At the same time, healthcare organisations handle large volumes of sensitive personal data under strict regulatory frameworks: GDPR in Europe, HIPAA in the United States, and national health data regulations that vary by jurisdiction. These frameworks impose retention obligations, erasure rights, and data localisation requirements that create tension with immutable record systems. ROOTKey resolves this tension: it provides cryptographic integrity guarantees without requiring personal data to be written permanently to a public blockchain.

How ROOTKey Solves It

ROOTKey separates the integrity proof from the data itself. Personal or sensitive data is stored off-chain, within your infrastructure or ROOTKey’s encrypted storage. Only a cryptographic hash - which cannot be reversed to recover the original data - is anchored to the blockchain. This means:
  • Integrity is provable - the hash on-chain proves that the data has not been altered since anchoring
  • GDPR erasure is possible - the off-chain data can be deleted; the on-chain proof does not contain personal data
  • Data residency is preserved - off-chain data remains within your perimeter or a defined region
  • Regulatory submissions are defensible - trial data and safety records are anchored at the moment of collection, with a blockchain timestamp that cannot be backdated

Architecture


Implementation

1

Design your vault structure around data categories

Create separate vaults for different data categories - clinical trial data, adverse event reports, patient consent records, post-market surveillance data. This enables granular access control and simplifies providing regulators with scoped evidence.Create Vault
2

Anchor records at collection - before any processing

Anchor clinical data, safety reports, or consent records at the moment of collection - before the data enters any processing pipeline. This establishes the integrity baseline at the earliest possible point.Create File
3

Anchor amendments with full version history

If a record is legitimately amended - a data query response, a protocol deviation correction - anchor the amended version as a new version. The original and all amendments are preserved and independently verifiable.Create File Version · Get File Versions
4

Handle GDPR erasure without losing audit integrity

When a data subject exercises their right to erasure, delete the off-chain record. The on-chain hash remains - it is not personal data and cannot be used to recover the original content. The audit trail of the record’s existence is preserved; the personal data is gone.RKP-3 Protocol · Security & Trust - GDPR
5

Provide verifiable evidence for regulatory submissions

For regulatory submissions - EMA, FDA, national health authorities - provide the vault ID and file IDs for the relevant dataset. Regulators can verify the integrity and timestamp of each record independently, without accessing the underlying personal data.Validate File · Get File History

ParameterRecommendation
ProtocolRKP-3 (Hybrid) - off-chain storage for personal data with on-chain integrity proof; RKP-1 (Full On-Chain) only for anonymised or aggregate data
DeploymentOn-Premise for health systems with strict data localisation requirements; API Integration for cloud-native platforms in GDPR-compliant regions; Container for private cloud deployments
Personal dataNever submit identifiable personal data for on-chain anchoring - use RKP-3 with off-chain storage
Anchor timingAnchor at collection, not at submission - the earlier the anchor, the stronger the integrity evidence
Erasure handlingImplement a documented erasure process that deletes off-chain data while preserving the on-chain proof; record the erasure event in the vault audit log

Key API Endpoints

EndpointPurpose
Create VaultCreate vaults per study, data category, or system
Create FileAnchor clinical records at collection
Create File VersionAnchor amendments and corrections
Get File HistoryFull amendment history for a record
Validate FileValidate a record against its on-chain anchor
RKP-3 ProtocolGDPR-compatible hybrid anchoring
On-Premise DeploymentData localisation and perimeter control

Compliance Alignment

FrameworkHow this use case addresses it
GDPROff-chain erasure compatible; on-chain proof contains no personal data; supports right-to-erasure without losing audit integrity
EU Clinical Trials Regulation (536/2014)Tamper-evident trial data with blockchain-anchored timestamps for regulatory submissions
ICH E6 (GCP)Good Clinical Practice data integrity - anchoring at collection prevents backdating and alteration
21 CFR Part 11 (FDA)Electronic records and signatures with audit trail - blockchain anchoring provides an additional immutability layer
ISO 27001 (in progress)A.5.33 (protection of records), applied to clinical and patient data management
NIS2For health entities classified as critical or important - data integrity and auditability obligations
MDR / IVDRPost-market surveillance data integrity for medical device and IVD manufacturers

Request a healthcare architecture consultation

We’ll design a GDPR-compatible integrity architecture tailored to your clinical systems, data residency requirements, and regulatory submission obligations.

Get started - free account

Test the GDPR-compatible anchoring pattern in the sandbox environment before touching patient data.