DATA ACCESS TRACKING

DATA ACCESS TRACKING

Sometimes, the best way to stop people from doing what they shouldn’t is to ensure that, if they do it, they get caught. By managing documents so that not only every change but even every access to them is securely and immutably recorded on a tamper proof blockchain, if data is leaked or stolen then it becomes a straightforward matter to work out who accessed the data most recently before the leak took place. Optionally, to ensure further data security and data loss prevention,  digital watermarking can be added to ensure that each time the document is opened then it is, in some subtle way, unique. This provides a forensic link between the leaked data and the perpetrator.

DATA ACCESS TRACKING KEY ATTRIBUTES

This approach is particularly powerful when combined with Information Based Security Architecture, because then the documents don’t exist when not being read and so can’t be stolen without going through the system.

By using blockchain security to track the document history, the history is made immutable and so not susceptible to being hacked or otherwise falsified. The larger the number of users with access to the data (and therefore the higher the risk of a ‘bad apple’ in their midst), the more secure data management system becomes as copies of the blockchain proliferate.

COVID-19

We are adhering to the latest UK Government advice and instructions in order to maximise the protection of all our customers, employees, suppliers and their families.

Please contact us by email at enquiries@exsel-group.com or by telephone on +44 (0) 1684 579 000 if you have any enquiries, need further information or assistance.

Deliveries are severely restricted and site access is strictly controlled - please ensure you have pre-cleared any deliveries with supply chain managers BEFORE attempting delivery.

© 2020 Exsel Group

Registered Office: 3 Talina Centre, Bagleys Lane, London, SW6 2BW

All Rights Reserved