HOW DOES KEEEX ADDRESS THESE ISSUES?
Using the KeeeX technology, the Data Protection Officer (DPO) can easily:
•respond to audit requests concerning personal data processing and location.
•respond to personal data recovery, transfer and destruction requests in a timely manner.
•prevent and detect data violations, including on the dark web.
The informed consent of the user can be collected with unprecedented levels of quality: a user’s electronic signature applies to exact and easily verifiable documents, and produces blockchain traceable standalone proof records.
The identity of a user is self-sovereign. Her interaction with the service requires only the strict necessary elements, and may even remain pseudonymous (health data).
Respect for privacy and industrial property is ultimate: processing is made locally and shares are end to end encrypted.
01. Proof of Consent
What is this? Consent is an active and explicit user process that must be free, specific, and informed. In an online form, it can materialize, for example, by a checkbox, unchecked by default.
KeeeX Solution : KeeeX embeds within every file a unique and humanized identifier that can easily and freely be verified without trusted tier. Consent now applies to exact and guaranteed documents. This requires KeeeX Core, KeeeX ChatOps or our Proof of Consent module
02. Data Location
What is this? In order to return data to a user as quickly as possible, companies must know the exact location of personal data at any time.
KeeeX Solution : KeeeX embeds unique identifiers and tags inside files to easily locate the data related to your customer, even in deep company filesystems or application silos, ultimately by using low level system commands. This is available using KeeeX Core, KeeeX ChatOps or KaaaS
What is this? Pseudonymization helps telling apart personal data from other irrelevant information. Pseudonymization generates an identification key that allows to establish the link between various personal information sources.
KeeeX Solution : The use of blockchain identities allows for total user control over their identities used in connection with web services or portals: Requires KeeeX Identities, Blockchain anchors and Timestamps
04. Data Portability
What is this? Users have the right to claim all the personal data they have provided to a service, in a structured format, preferably user machine-readable. They also have the right to transmit this data to another processing manage.
KeeeX Solution : KeeeX embeds within every file unique identifiers that make their location a snap. All our apps also fully leave data on user’s side, which renders the requirement satisfied by default.
05. Privacy by design
What is this? Data protection requirements must be taken into account by organizations as early as since the design stage of their products, services and systems.
KeeeX Solution : All KeeeX solutions leave data on user’s side. When data transfer is involved, as in KeeeX ChatOps for instance, it is performed using state of the art end to end encryption. Data is shared using peer to peer zero knowledge procedures.
What is this ? Accountability is the obligation made for companies to implement appropriate technical and organizational measures to ensure that the treatment of personal data is performed under the Regulation, and be able to demonstrate.
KeeeX Solution : All KeeeX solutions embed within each file regardless of their format a unique identifier so that data can be traced on premises without third parties. Proof of deletion for instance is straightforward to demonstrate.