Medforall · Stark County Board of DD
Privacy-First Thermal Sensing Program
Data Governance & Security Policy
Save this document for offline use

Data Governance & Security Policy (DGSP)

Sleep & Safety Monitoring Edition — Stark County DODD Contract #2558727
Version 1.0 · April 2026 · Medforall

Plain-Language Summary

If you or your loved one is using HEARO thermal sensors for sleep and safety monitoring, here’s what you need to know:

Important: This system supports the people keeping your loved one safe — it does not replace them. Notifications go to awake, on-duty staff only. No existing supports are removed until the team has real data showing the system is reliable for this person.

1. Purpose & Scope

This policy governs how Medforall collects, accesses, stores, secures, and retains data from thermal sensors used for sleep and safety monitoring in community-based HCBS residences. This scoped version focuses on thermal-only deployments for the Stark County program (60 participants with DD and seizure disorders).

This policy aligns with Ohio’s proposed rule 5123-2-XX (audio/video devices in HCBS residences) and applies to individuals, families/guardians, care teams, and Medforall as the data controller.

What this policy covers: thermal sensor data collection and access, encryption and security, who can see the data and when, retention periods, and your rights.

What this policy does NOT cover: RGB cameras (separate addendum), audio monitoring (not part of thermal-only scope), wearable devices (separate agreements).

2. What Thermal Sensors Collect

The Two-Layer Privacy Model

Privacy in the HEARO system works on two levels:

  1. Inherent thermal privacy: Thermal sensors detect infrared heat and create heat-map images. No faces, no identifying features — though body shape, posture, limb positions, and activity are visible. Heat patterns cannot reveal identity.
  2. Software filters: Additional software processing further reduces what the human viewer sees, limiting visual detail beyond what thermal inherently provides.

What Thermal Sensors Can Detect

CapabilityDescription
In-bed / out-of-bed stateWhether a person is lying in bed or has gotten up
Posture changesLying to sitting to standing, based on heat signature shape
Movement patternsActivity vs. stillness, restlessness during sleep
Prolonged inactivityNo movement beyond a configured threshold
Floor presenceHeat signature at floor level (potential fall)
Body shape & limb positionsGeneral body form, gender indicators, multiple people distinguishable
CPAP displacementMask movement or removal detectable via head region
Liquid on bedTemperature differential from body-temp liquids
Baseline deviations over timeChanges from normal patterns (improves over 30–90 days)

What Thermal Sensors Cannot Detect

Cannot DetectWhy
Faces or identityThermal resolution and modality cannot capture identifying facial features
Text, clothing color, room contents at ambient tempObjects at room temperature are invisible to thermal
Emotional stateHeat patterns do not convey subjective experience
Seizure activity itselfSeizures are neurological events; thermal detects movement consequences only
Breathing or respiratory distressThermal does not measure airflow or respiratory rate
Choking or aspirationInternal events without distinct thermal signature
Seizure Monitoring: Thermal is a moderate confidence proxy for tonic-clonic seizures. It detects movement consequences (falls, thrashing, prolonged immobility) — not seizure electrical activity. It cannot detect absence or focal seizures. Confidence improves with 30+ days of baseline data.

3. Data Security

Encryption

Access Control

Local Buffer & Backups

4. Who Can Access Your Data & When

RoleCan SeeCannot DoWhen
Remote Support StaffLive thermal stream, shift recordings, alertsAccess outside shift hours, download/export, change settingsScheduled monitoring hours only
SupervisorsSame as above + emergency override approval, audit logs, limited export for incidentsOverride consent/ISP, delete audit logsScheduled hours + documented emergencies
SSAs / Service CoordinatorsMonthly/quarterly summaries, alert event logs, outcome dataView live data, request incident packages without formal processRoutine business hours
Family / GuardianSeparate encrypted stream via Guardian App (if enrolled in AT)Access provider-side dataPer care plan agreement

5. Emergency Access (Break-Glass Protocol)

In a life-threatening emergency outside normal hours:

  1. Supervisor approves access based on emergency reason
  2. Live thermal stream opens for up to 30 minutes
  3. Real-time notification sent to you and supervisory staff
  4. Access is logged with reason code, timestamp, and duration
  5. Post-event review within 1 business day
  6. You are notified and can dispute if you believe it was misused

6. Data Retention & Deletion

Data TypeRetention
Routine sleep monitoring recordings30–90 days (unless you request longer)
Seizure monitoring / higher-riskUp to 180–365 days (baseline building)
Audit logs and access recordsMinimum 1 year
Major Unusual Incident (MUI) recordings + logsMinimum 7 years from incident date
Data outside monitoring hoursAutomatically deleted after 24 hours

Secure deletion uses cryptographic hash-check verification. You receive proof of destruction.

7. What We Will Never Do

8. Your Rights

RightHow It Works
Pause or stop monitoringAnytime. No permission, penalty, or explanation needed. System enters Privacy Mode.
Withdraw consentAll monitoring stops and data is deleted (except MUI-related). Effective within 7 business days. Deletion verified with hash-check.
Access your dataRequest a summary of what was collected, who accessed it, and when. Provided within 30 days in plain language.
Correct or disputeFile a complaint about wrong schedules, inappropriate access, or misuse. Investigated within 10 business days.
AccommodationsAvailable in large print, audio, other languages, or simplified versions.

9. Privacy Controls Available to You

10. Audit & Accountability

Every access is logged with who, when, why, what they did, and the outcome. Logs are immutable. Medforall conducts periodic audits for compliance. You can request an audit report of all accesses to your data in the past 6 months, provided within 30 days.