How KRATE data storage works.
High Value Targets
Central data silos provide high value targets for hackers much like banks provide high value targets for bank robbers.
Lack of Encryption
Only 4% of all stolen data was encrypted due to data privacy protection relying heavily on access controls as the only line of defense.
Training and implementation errors of privacy protection systems leads to human error, creating environments with avoidable security risks.
Access is limited to users that have a legitimate purpose and/or operate in an appropriate role.
Information will only be available if required to perform a specific task even if the person or device has access.
Privacy by design
Design and implementation are privacy driven.
Regardless of the task, data is encrypted at every step and at rest. Data is only decrypted on devices authorized by the data owner.
Alert data owners of possible misuse, misrepresentation and/or misappropriation of information.
A combination of erasure coding and checksums allows the KRATE Cloud to repair corrupted or missing user data with zero knowledge of what the data is. Data owners do not need self-monitor data to maintain integrity.
Achieving and maintaining compliance with PIPEDA in Canada, HIPAA in the US, or GDPR in Europe, is made easier with the ability to enable or disable integrated privacy standards on demand.
Storage contracts allow for the user to specify regions where data can be stored for unique compliance requirements like the UKUSA Intelligence Agreement which specifies data is stored in the Five Eyes member countries.