HowTo, Help Archives - Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files /blog/category/howto-help/ Sign, label, trace and verify all your content Tue, 04 Jun 2024 11:54:55 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 /wp-content/uploads/cropped-Âé¶¹´«Ã½É«Ç鯬_logo_rond-1-32x32.png HowTo, Help Archives - Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files /blog/category/howto-help/ 32 32 How can Âé¶¹´«Ã½É«Ç鯬 simplify your GDPR compliance ? /blog/2017/10/18/compliance-gdpr/ /blog/2017/10/18/compliance-gdpr/#respond Wed, 18 Oct 2017 08:32:04 +0000 /?p=8201 The post How can Âé¶¹´«Ã½É«Ç鯬 simplify your GDPR compliance ? appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
It isÌýdifficult to get a clear view aboutÌýthe new European General Data Protection Regulation.ÌýBelow isÌýa summary of essential information to understand to enter yourÌýGDPR compliance process, followed by details on how Âé¶¹´«Ã½É«Ç鯬 can make it ultra simple.

HOW DOES KEEEX ADDRESS THESE ISSUES?

Using the Âé¶¹´«Ã½É«Ç鯬 technology, the Data Protection Officer (DPO) can easily:

•respond to audit requests concerning personal dataÌýprocessing and location.

•respond to personalÌýdataÌýrecovery, transfer and destruction requests in a timely manner.

•prevent and detect data violations, including on the dark web.

The informed consent of the user can be collected with unprecedented levels of quality:Ìýa user’s electronic signatureÌýappliesÌýto exact and easily verifiableÌýdocuments, and produces blockchain traceable standalone proofÌýrecords.

The identity of a user is self-sovereign. Her interaction with the service requires only the strict necessary elements, and may even remain pseudonymous (health data).

Respect for privacy and industrial property is ultimate: processing isÌýmade locally and shares are end to end encrypted.

01. Proof of Consent

What isÌýthis?ÌýConsent is an active andÌýexplicitÌýÌýuserÌýprocess that must be free, specific, and informed. In an online form, it can materialize, for example, by a checkbox, unchecked by default.

°­±ð±ð±ð³ÝÌý³§´Ç±ô³Ü³Ù¾±´Ç²ÔÌý:ÌýÂé¶¹´«Ã½É«Ç鯬 embeds within every Ìýfile a unique and humanizedÌýidentifierÌýthat can easily andÌýfreely be verifiedÌýwithout trustedÌýtier. Consent now applies to exact andÌýguaranteedÌýdocuments.ÌýÌýThisÌýrequiresÌýÂé¶¹´«Ã½É«Ç鯬 Core, Âé¶¹´«Ã½É«Ç鯬 ChatOps or our Proof of Consent module

 

02. DataÌýLocation

What isÌýthis? In order to return data to a user as quicklyÌýas possible, companies must know the exact locationÌýof personal data at any time.

°­±ð±ð±ð³ÝÌý³§´Ç±ô³Ü³Ù¾±´Ç²ÔÌý:ÌýÂé¶¹´«Ã½É«Ç鯬 embeds uniqueÌýidentifiers and Ìýtags inside filesÌýto easily locate the data related to your customer, even inÌýdeep company filesystems or application silos, ultimately byÌýusing low level system commands. This is available using Âé¶¹´«Ã½É«Ç鯬 Core, Âé¶¹´«Ã½É«Ç鯬 ChatOps or KaaaS

03. Pseudonymization

What is this?ÌýPseudonymization helps telling apartÌýpersonal dataÌýfrom other irrelevant information. Pseudonymization generates an identification key that allows to establish the link between variousÌýpersonalÌýinformation sources.

°­±ð±ð±ð³ÝÌý³§´Ç±ô³Ü³Ù¾±´Ç²ÔÌý:ÌýThe use of blockchain identities allows for total user control over their identities usedÌýin connectionÌýwith web services or portals: Requires Âé¶¹´«Ã½É«Ç鯬 Identities, Blockchain anchorsÌýand Timestamps

04. Data Portability

What isÌýthis? Users have the right to claim all the personal data they have provided to a service, in a structured format, preferably userÌýmachine-readable. They also have the right to transmit this data to another processing manage.

°­±ð±ð±ð³ÝÌý³§´Ç±ô³Ü³Ù¾±´Ç²ÔÌý:ÌýÂé¶¹´«Ã½É«Ç鯬 embeds withinÌýevery file unique identifiers that makeÌýtheir location a snap. All ourÌýapps also fully leave data on user’s side, which renders the requirementÌýsatisfied by default.

05. Privacy by designÌý

What isÌýthis? Data protection requirements must be taken into account by organizations as early as since the design stage of their products, services and systems.

°­±ð±ð±ð³ÝÌý³§´Ç±ô³Ü³Ù¾±´Ç²ÔÌý: AllÌýÂé¶¹´«Ã½É«Ç鯬 solutions leave data on user’s side. When data transfer is involved, as in Âé¶¹´«Ã½É«Ç鯬 ChatOps for instance, itÌýis performed using state of the art end to end encryption. Data is sharedÌýusing peer toÌýpeer zeroÌýknowledge procedures.

06. AccountabilityÌý

What isÌýthis ? Accountability is the obligation made for companies to implement appropriate technical and organizational measures to ensure that the treatment of personal data is performed under the Regulation, and be able to demonstrate.

Âé¶¹´«Ã½É«Ç鯬ÌýSolution : AllÌýÂé¶¹´«Ã½É«Ç鯬 solutions embedÌýwithinÌýeach file regardless of their format a unique identifier so that data can be traced on premises without third parties. Proof of deletion for instance is straightforward to demonstrate.

The post How can Âé¶¹´«Ã½É«Ç鯬 simplify your GDPR compliance ? appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
/blog/2017/10/18/compliance-gdpr/feed/ 0
The Âé¶¹´«Ã½É«Ç鯬 Messenger Teaser /blog/2016/05/24/the-keeex-messenger-teaser-xofad-bosop/ /blog/2016/05/24/the-keeex-messenger-teaser-xofad-bosop/#respond Tue, 24 May 2016 12:26:13 +0000 /?p=2053 This slideshow provides highh level insights of the features and properties of Âé¶¹´«Ã½É«Ç鯬 Messenger. The Ultra Secure, Rich, Probative Enterprise Messenger No Infrastrucure, Data remains under absolute user control Leak free, Cheat free, Loss free, Tie-in free, Blockchain trust Reclaim and Futurize your Collaboration – May 2016 The Âé¶¹´«Ã½É«Ç鯬 Messenger teaser 2016-05-19-lh-xofad-bosop from Laurent Henocque

The post The Âé¶¹´«Ã½É«Ç鯬 Messenger Teaser appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
This slideshow provides highh level insights of the features and properties of Âé¶¹´«Ã½É«Ç鯬 Messenger.

The Ultra Secure, Rich, Probative Enterprise Messenger
No Infrastrucure, Data remains under absolute user control
Leak free, Cheat free, Loss free, Tie-in free, Blockchain trust

Reclaim and Futurize your Collaboration – May 2016

from

The post The Âé¶¹´«Ã½É«Ç鯬 Messenger Teaser appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
/blog/2016/05/24/the-keeex-messenger-teaser-xofad-bosop/feed/ 0