light background
Data Lifecycle

Industry Leading Security

Data isn't alive?

The purpose of Proofenance is to gather and present relevant, sensitive information about a person. Proofenance completely understands that this is a worrying concept, with the long history of data breaches from poorly designed and maintained company systems.

A piece of information on its own doesn't carry much risk, however a collection of different pieces attributable to a real person absolutely does. When these pieces are kept in the same place, behind the same security methods, a data breach target is formed.

identityPieces

The data collection is commercially useful just once—at the Point of Sale. After this, the data will be archived for a length of time to satisfy any auditing or reporting requirements, or until an eviction request.

Evicting the data collection from Proofenance's systems will remove all traces from Proofenance's archive, but leave the individual disbursed pieces of information with their original sources.

This collection and eventual disbursement of information represents the Proofenance data lifecycle.

Who has access?

Proofenance is proud at the level of security afforded our data by building a Well-Architected cloud native system with best-in-class cyber security concepts right from the start. Only authorised people may view sensitive data at applicable times during the data lifecycle.

If you would like to know more about our data security, we are proud to be able to share how we follow AWS Well-Architected principles—just get in touch us and we can show you around our stack.

Secure by design

Every component of our platform is designed with security in mind from the ground up. We use the latest technologies and industry standards to ensure your data is safe and secure.

Find out more about our security features below.