🖼📋 Epic 2 User Profile: Encrypting Data in Transit via Auth0, Lob, Twilio #495
Replies: 4 comments 6 replies
-
Follow these steps to integrate Auth0 and Twilio based SMS auth to Amplify https://auth0.com/docs/quickstart/spa/vuejs?framed=1&sq=1#configure-auth0 |
Beta Was this translation helpful? Give feedback.
-
#128 @smgraywood issue exists |
Beta Was this translation helpful? Give feedback.
-
Pair Hour decisions 3/29
Our focus is to update the two data models of constituents and letters_sent while we set up Twilio to create communication for
Future of profile: |
Beta Was this translation helpful? Give feedback.
-
about |
Beta Was this translation helpful? Give feedback.
-
Feature Batches
For 2024 Fall cohort:
Auth0 integration: check https://github.com/OpenSourceFellows/amplify_docs/discussions/11
SMS letter workflow (Twilio): check https://github.com/OpenSourceFellows/amplify_docs/discussions/10
User Profile base setup (Weeks 2-5)
Data Collection Mechanism (Weeks 6-9)
Context
PII stands for personally identifiable information, any data that can be used to identify a specific person. The most common forms of PII include things like Social Security numbers, email addresses, and phone numbers. PII can also refer to digital identifiers, such as biometric data, geolocation, user IDs, and an IP address.
PII compliance is a complex ecosystem. Unlike Protected Health Information (PHI), which is primarily governed by HIPAA, there is a network of regulations all over the world that aim to enforce PII compliance.
In the U.S., the National Institute of Standards and Technology (NIST) Guide to Protecting the Confidentiality of Personally Identifiable Information defines “personally identifiable” as information like name, Social Security number, and biometric records, which can be used to distinguish or trace an individual’s identity.
How PII Applies to Amplify
Questions to think through around the principles of PII Policy:
Beta Was this translation helpful? Give feedback.
All reactions