US compliance: HIPAA, CCPA, SOX, GLBA, FERPA, COPPA, FDA, EPA, FFIEC, NYDFS + 4 state privacy laws
Navigate US compliance from the AI age.
Query HIPAA, CCPA, SOX, GLBA, FERPA, COPPA, FDA 21 CFR Part 11, FDA 21 CFR 820 (QSR/QMSR), FDA Premarket & Postmarket Cybersecurity Guidance, FD&C Act Section 524B (PATCH Act), CIRCIA, EPA RMP, FFIEC, NYDFS 500, and 4 state privacy laws (Virginia CDPA, Colorado CPA, Connecticut CTDPA, Utah UCPA) directly from Claude, Cursor, or any MCP-compatible client.
If you're building healthcare tech, consumer apps, or financial services for the US market, this is your compliance reference.
Built by Ansvar Systems — Stockholm, Sweden
US compliance is scattered across regulations.gov PDFs, eCFR.gov pages, state legislative sites, and agency guidance documents. Whether you're:
...you shouldn't need to navigate fragmented federal agencies, 50 state legislatures, and conflicting PDF formats. Ask Claude. Get the exact section. With context.
This MCP server makes US regulations searchable, cross-referenceable, and AI-readable.
Connect directly to the hosted version — zero dependencies, nothing to install.
Endpoint: https://us-regulations-mcp.vercel.app/mcp
| Client | How to Connect |
|---|---|
| Claude.ai | Settings > Connectors > Add Integration > paste URL |
| Claude Code | claude mcp add us-regulations --transport http https://us-regulations-mcp.vercel.app/mcp |
| Claude Desktop | Add to config (see below) |
| GitHub Copilot | Add to VS Code settings (see below) |
Claude Desktop — add to claude_desktop_config.json:
{
"mcpServers": {
"us-regulations": {
"type": "url",
"url": "https://us-regulations-mcp.vercel.app/mcp"
}
}
}GitHub Copilot — add to VS Code settings.json:
{
"github.copilot.chat.mcp.servers": {
"us-regulations": {
"type": "http",
"url": "https://us-regulations-mcp.vercel.app/mcp"
}
}
}npx @ansvar/us-regulations-mcpClaude Desktop — add to claude_desktop_config.json:
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
{
"mcpServers": {
"us-regulations": {
"command": "npx",
"args": ["-y", "@ansvar/us-regulations-mcp"]
}
}
}Cursor / VS Code:
{
"mcp.servers": {
"us-regulations": {
"command": "npx",
"args": ["-y", "@ansvar/us-regulations-mcp"]
}
}
}This MCP server follows OpenSSF Best Practices for secure open source development:
✅ Automated Security Scanning
✅ Daily Freshness Monitoring
✅ Secure Publishing
✅ Security Metrics
Report security issues: See SECURITY.md
Once connected, just ask naturally:
Healthcare & Privacy:
HIPAA - Health Insurance Portability and Accountability Act
CCPA/CPRA - California Consumer Privacy Act / Privacy Rights Act
Financial Services:
SOX - Sarbanes-Oxley Act
GLBA - Gramm-Leach-Bliley Act Safeguards Rule (NEW in v1.1)
Education:
Children's Privacy:
Pharmaceutical & Medical Devices:
Critical Infrastructure & Incident Reporting:
Environmental & Chemical Safety:
Banking & Financial Institutions:
State Financial Services:
State Privacy Laws:
Virginia CDPA - Consumer Data Protection Act (NEW in v1.2)
Colorado CPA - Colorado Privacy Act (NEW in v1.2)
Connecticut CTDPA - Connecticut Data Privacy Act (NEW in v1.2)
Utah UCPA - Utah Consumer Privacy Act (NEW in v1.2)
Payment Card Industry:
Additional regulations in development:
Detailed coverage: docs/coverage.md
Verbatim Source Text (No LLM Processing):
Smart Context Management:
Technical Architecture:
eCFR/LegInfo HTML → Parse → SQLite → FTS5 snippet() → MCP response
↑ ↑
Formatting only Verbatim database query| regulations.gov / eCFR | This MCP Server |
|---|---|
| Search by CFR citation | Search by plain English: "breach notification timeline" |
| Navigate fragmented agency sites | Get the exact section with context |
| Manual cross-referencing across federal/state | compare_requirements tool does it instantly |
| "Which regulations apply to me?" → weeks of research | check_applicability tool → answer in seconds |
| Copy-paste from PDFs with formatting issues | Section + definitions + related requirements |
| Check eCFR, regulations.gov, 50 state sites | Unified search across all sources |
| No API for most sources | MCP protocol → AI-native |
regulations.gov example: Download HIPAA PDF → Ctrl+F "breach" → Read §164.410 → Google "What's a 'reportable breach'?" → Cross-reference CCPA → Check California site → Repeat for SOX
This MCP: "Compare breach notification requirements across HIPAA, CCPA, and SOX" → Done.
🚨 THIS TOOL IS NOT LEGAL ADVICE 🚨
This tool provides regulatory text for research and educational purposes. However:
- Control mappings (NIST 800-53, NIST CSF) are interpretive guidance, NOT official HHS, NIST, or agency crosswalks
- Applicability rules are generalizations, not legal determinations
- Cross-references are research helpers, not compliance mandates
Always verify against official sources and consult qualified legal counsel for compliance decisions.
📋 Source Quality Disclosure
Tier 1 - Official API Sources (Authoritative):
- HIPAA, GLBA, FERPA, COPPA, FDA 21 CFR 11, EPA RMP — sourced from eCFR.gov official API
- CCPA/CPRA — sourced from California LegInfo official site
Tier 2 - Official State Sources (HTML Scraping):
- Virginia CDPA — sourced from law.lis.virginia.gov
- Connecticut CTDPA — sourced from cga.ct.gov
- Utah UCPA — sourced from le.utah.gov
- Colorado CPA — seed data verified against leg.colorado.gov
Tier 3 - Seed Data (Verified but Static):
- FFIEC IT Handbook — examination guidance extracted from ffiec.gov booklets
- NYDFS 500 — regulatory text from dfs.ny.gov
- SOX — statute and SEC implementing regulations
Seed data sources include official source attribution and verification dates. Users should check official sources for updates.
Control Framework Mappings: HIPAA-to-NIST and CCPA-to-NIST mappings are interpretive guidance to assist compliance research. They are NOT official agency crosswalks. Consult NIST SP 800-66 and official agency guidance for authoritative mappings.
⚠️ Context Window Warning
Some regulation sections can be large (e.g., HIPAA Privacy Rule sections with extensive commentary). The MCP server:
- Search tool: Returns smart snippets (safe for context)
- Get section tool: Returns full text (may consume significant tokens)
- Recommendation: Use search first, then fetch specific sections as needed
Claude Desktop has a 200k token context window. Monitor your usage when retrieving multiple large sections.
📋 Initial Release
This is a production-ready MVP with three foundational regulations (HIPAA, CCPA, SOX). The database schema and all 9 MCP tools are fully functional and thoroughly tested (100% test coverage).
Data Ingestion: Automated ingestion from official API sources (eCFR.gov, California LegInfo) is operational. Additional regulations are being added to the database.
Coming Soon: Additional federal regulations (GLBA, FERPA, FISMA) and state breach notification laws.
No copyrighted NIST standards are included. Control mappings reference NIST 800-53 control IDs only (e.g., "AC-1", "SI-4"). While NIST standards are freely available from NIST, this tool helps map regulations to controls but doesn't replace reading the standards themselves.
The server provides 9 MCP tools:
| Tool | Description |
|---|---|
search_regulations | Full-text search across all regulations with highlighted snippets |
get_section | Retrieve full text of a specific regulation section |
list_regulations | List available regulations or get hierarchical structure |
compare_requirements | Compare topic across multiple regulations |
map_controls | Map NIST controls to regulation sections |
check_applicability | Determine which regulations apply to your sector |
get_evidence_requirements | Get compliance evidence requirements for a section |
get_compliance_action_items | Generate structured compliance action items |
Detailed tool reference: docs/tools.md
This repository uses a dev integration branch. Do not push directly to main.
feature-branch → PR to dev → verify on dev → PR to main → deploy
main is production-ready. Only receives merges from dev via PR.dev is the integration branch. All changes land here first.dev.# Clone the repository
git clone https://github.com/Ansvar-Systems/US_compliance_MCP.git
cd US_compliance_MCP
# Install dependencies
npm install
# Build the database schema
npm run build:db
# Load seed data
npm run load-seed
# Build the TypeScript code
npm run build
# Run in development mode
npm run devnpm run build # Compile TypeScript to dist/
npm run dev # Run server in development mode with tsx
npm run build:db # Initialize database schema
npm run load-seed # Load seed data for testing
npm test # Run test suite with vitest (100% coverage)
npm run test:mcp # Test MCP tool integrationus-regulations-mcp/
├── src/
│ ├── index.ts # MCP server entry point
│ ├── tools/ # MCP tool implementations
│ │ ├── registry.ts # Central tool registry
│ │ ├── search.ts # Full-text search
│ │ ├── section.ts # Section retrieval
│ │ ├── list.ts # List regulations
│ │ ├── compare.ts # Compare requirements
│ │ ├── map.ts # Control mappings
│ │ ├── applicability.ts # Applicability checker
│ │ ├── definitions.ts # Term definitions
│ │ ├── evidence.ts # Evidence requirements
│ │ └── action-items.ts # Compliance action items
│ └── ingest/ # Ingestion framework
│ ├── framework.ts # Base interfaces
│ └── adapters/ # Source-specific adapters
├── scripts/
│ ├── build-db.ts # Database schema builder
│ ├── load-seed-data.ts # Seed data loader
│ └── ingest.ts # Data ingestion orchestrator
├── data/
│ └── regulations.db # SQLite database
└── docs/ # DocumentationThe server uses SQLite with FTS5 (full-text search) for efficient querying:
The ingestion framework uses an adapter pattern to normalize data from multiple US regulatory sources:
Each adapter handles source-specific pagination, authentication, and data normalization.
The server implements the Model Context Protocol specification:
This server is part of Ansvar's Compliance Suite - three MCP servers that work together for end-to-end compliance coverage:
Query 47 EU regulations directly from Claude
npx @ansvar/eu-regulations-mcpQuery US federal and state compliance laws directly from Claude
npm install @ansvar/us-regulations-mcpQuery 1,451 security controls across 28 frameworks
pipx install security-controls-mcpRegulations → Controls Implementation Workflow:
1. "What are HIPAA's security safeguard requirements?"
→ US Regulations MCP returns 45 CFR § 164.306 full text
2. "What security controls satisfy HIPAA §164.306?"
→ Security Controls MCP maps to NIST 800-53, ISO 27001, and SCF controls
3. "Show me NIST 800-53 AC-1 implementation details"
→ Security Controls MCP returns control requirements and framework mappingsComplete compliance in one chat:
We build AI-accelerated threat modeling and compliance tools for automotive, financial services, and healthcare. This MCP server started as our internal reference tool for US regulations — turns out everyone building for US markets has the same compliance research frustrations.
So we're open-sourcing it. Navigating federal and state regulations shouldn't require a legal team.
ansvar.eu — Stockholm, Sweden
We maintain a family of MCP servers for compliance and security professionals:
| Server | Description | Install |
|---|---|---|
| EU Regulations | 47 EU regulations (GDPR, AI Act, DORA, NIS2, MiFID II, eIDAS, MDR...) | npx @ansvar/eu-regulations-mcp |
| Security Controls | 1,451 controls across 28 frameworks (ISO 27001, NIST CSF, PCI DSS, CMMC...) | pipx install security-controls-mcp |
| OT Security | IEC 62443, NIST 800-82, MITRE ATT&CK for ICS | npx @ansvar/ot-security-mcp |
| Automotive | UNECE R155/R156, ISO 21434 for automotive cybersecurity | npx @ansvar/automotive-cybersecurity-mcp |
| Sanctions | Offline sanctions screening with OpenSanctions (30+ lists) | pip install ansvar-sanctions-mcp |
Browse all projects: ansvar.eu/open-source
This server is read-only and does not require a login account for functional review. For directory review, use the bundled dataset and these sample prompts:
The default server runtime is read-only and can be deployed without authentication. If you deploy a remote authenticated endpoint, use OAuth 2.0 over TLS with certificates from recognized authorities.
US_COMPLIANCE_DB_PATH points to a readable SQLite file./mcp POST routing and mcp-session-id header forwarding.list_regulations first to verify dataset initialization.Contributions are welcome! Please read our Contributing Guide for details on:
By participating in this project, you agree to abide by our Code of Conduct.
For issues, questions, or feature requests:
Apache License 2.0. See LICENSE for details.