Data is processed according to applicable requirements (health/local hosting, encryption, access control). Deployment can be done on-premises or in the cloud depending on the context.