top of page

DATA ACCESS TRACKING

DATA ACCESS TRACKING

Sometimes, the best way to stop people from doing what they shouldn’t is to ensure that, if they do it, they get caught. By managing documents so that not only every change but even every access to them is securely and immutably recorded on a tamper proof blockchain, if data is leaked or stolen then it becomes a straightforward matter to work out who accessed the data most recently before the leak took place. Optionally, to ensure further data security and data loss prevention,  digital watermarking can be added to ensure that each time the document is opened then it is, in some subtle way, unique. This provides a forensic link between the leaked data and the perpetrator.

DATA ACCESS TRACKING KEY ATTRIBUTES

This approach is particularly powerful when combined with Information Based Security Architecture, because then the documents don’t exist when not being read and so can’t be stolen without going through the system.

By using blockchain security to track the document history, the history is made immutable and so not susceptible to being hacked or otherwise falsified. The larger the number of users with access to the data (and therefore the higher the risk of a ‘bad apple’ in their midst), the more secure data management system becomes as copies of the blockchain proliferate.

bottom of page