Solutions For Kinda Everyone

Covenants Improve Kinda Everything

This data control problem impacts different professionals in different ways often with different language but everyone is talking about the same data control problem. 

Privacy Professionals want simplified, proactive and predictable compliance. Security Professionals increasingly want to control access by identity instead of location. Marketing Professionals want more actionable data and more loyal customers. Developers want better identity and data sharing infrastructure to build next generation immersive and personalized experiences. Data Professionals want improved data quality, simplified data management, with more adaptive and modular data architectures.

Covenants for

Privacy

Simplified & Predictable Compliance

Covenants for

Security

Cybersecurity Mesh & Zero Trust Security

Covenants for

Marketing

Actionable Data & Customer Loyalty

Covenants for

Development

Immersive & Personalized Apps 

Covenants for

Data & AI

Agile & Modular Data Architectures

Automated Privacy Enforcement

Privacy Professionals

Get ahead of the audit and remediation cycle of delayed and retroactive response.  Proactively enforce minimum privacy regulations, more aspirational organizational privacy policies, as well as radically customer centric Covenants.

Continuous data control enforcement ensures consistent and comprehensive compliance. Data that fails compliance reports to you and denies access until compliance can be restored.

Alter Smart Data Contracts ™ with confidence all impacted data architecture and application logic adjust automatically to each change. Covenants enforce privacy and security compliance everywhere your data flows and grows. 

g

Unified Marketing & Privacy PreferenceS

Give your users the convenience to automatically synchronize privacy settings like email opt-ins, cookie tracking selections, and site privacy choices across many brand relationships from a single location.

Automated Privacy Enforcement

Covenants enforce and automate your legal rights like the right to Consent, to Be Forgotten, to Data Portability and to Jurisdictional Compliance. Covenants enforce and automate privacy regulations, data policies and licenses as well as customer centric Covenants.

Z

Contract All Data Uses

All future uses of your data require your express permission using the medical standard of informed consent. We cannot know all the potential future uses for our data but we can require our consent to all emergent new uses. Let Covenants automatically enforce your data agreements

Privacy Enhancing Technologies (PETs)

~

Secure Data from Hackers

Criminals will avoid Covenants and look for easier targets. Covenants encrypt your data with individual keys and grant access when compliance is assured. A data breach requires criminals to decrypt millions of individually encrypted and tracked data containers. 

Data Remote Control

You control your data. Consent to specific data uses. Revoke consent and access with one click. Covenants are created, transferred, versioned, deactivated for noncompliance, reactivated for compliance, eventually ended revoking all data access, and finally flagged for deletion.

*

Push Data Updates & Accept Access REquests

Covenants automatically update when you change your information like a new address, phone number or name change. Granting other people like support agents access to your data also confirms your identity. 

Simplified Data & Identity Sharing

A consistent data and identity sharing user experience grows trust and data exchange in a virtuous cycle. One consistent open source OAuth 2.0 user experience raises user confidence accelerating data sharing. 

Cybersecurity Mesh & Zero Trust Security

Security Professionals

Secure data across a growing number of data partners. Secure data automations within and outside the organization. Secure remote associates, customers, and users. Covenants manage, secure, contract, control and monetize your organizational data. 

~

CyberSecurity Mesh & DeperImEterization

Cybersecurity Mesh and Zero-Trust shifts the security perimeter from the object to the identity of a person or thing. Centralize control of data while distributing enforcement anywhere organizational data flows and grows.

Use Identities of Your Choice

Using federated and Sovereign Identity technologies and standards, control your many identities across many organizations. People can create and use different identities for different contexts and roles like work, or recreational activities. 

Edge Cache & Control

 The Edge Data Controller  gates and controls all access to Data Containers while enforcing Smart Data Contracts. The Edge Data Controller  enforces compliance at network edge enabling or disabling data access while providing secure Edge Compute data intensive functionality.

Bring Your Own Encryption (BYOE)

Secure your data with BYOE of your choice and keys you control. By design, Accesr can never access your data or enable others to access your data without your awareness and cooperation.  

Master Data Fabric

Master Data Fabric ™ tracks the data container lifecycle tracking all replicas, aggregates, physical locations, data lineage, and contract lineage. Data changes automatically version and update all downstream containers keeping all copies synced to the master data source.

Data Container Tracking

Data Containers are registered and tracked with a Universal Unique Identifier (UUID) within the Master Data Fabric ™. The source URL and the Data Container location URL enable remote control, versioning, and auditing while tracking and enforcing global data and contract lineage. 

~

Secure Data from Hackers

Criminals will avoid Covenants and look for easier targets. Covenants encrypt your data with individual keys and grant access when compliance is assured. A data breach requires criminals to decrypt millions of individually encrypted and tracked data containers. 

Data Remote Control

You control your data. Consent to specific data uses. Revoke consent and access with one click. Covenants are created, transferred, versioned, deactivated for noncompliance, reactivated for compliance, eventually ended revoking all data access, and finally flagged for deletion.

Consent Based marketing 

Marketing Professionals

Marketing Professionals want more actionable data and more loyal customers. To do this they need better identity and data sharing infrastructure to build next generation immersive and personalized experiences. Responsible marketers know product personalization and targeting advertising driven by consent is the key to retaining loyal customers.

Trust is the New Loyalty

Publish digital services and exclusive offers to your followers. Collaborate with partners. Give users reasons to chose to share more data in exchange for more personalized, relevant or exclusive digital services.

One-Click Registration

One-Click registration simplifies and accelerates new digital relationships. Control and change identity and data sharing experiences. Covenants ensure you control your data everywhere it moves and grows.

w

Internet of Behaviors (ioB)

Internet of Behaviors (IoB) seeks to understand data properly and apply that understanding to alter behaviors from a human psychology perspective. IoB should only be implemented with comprehensive and enforeable Informed Consent.

High Data QUality with Multiparty Lineage

Imagine having 100% confidence in your data. Covenants automatically update when their Master Data Source updates. Acting responsibly with other’s data ensures higher data quality for downstream services.

g

Unified Marketing & Privacy PreferenceS

Give your users the convenience to automatically synchronize privacy settings like email opt-ins, cookie tracking selections, and site privacy choices across many brand relationships from a single location.

Personalization CHOREOGRAPHy

Covenants enable your users to configure and control personalization of their choosing. They enable the choreography of personalized digital services across multiple organizations to serve each user’s unique needs.

Simplified Data & Identity Sharing

A consistent data and identity sharing user experience grows trust and data exchange in a virtuous cycle. One consistent open source OAuth 2.0 user experience raises user confidence accelerating data sharing. 

~

Secure Data from Hackers

Criminals will avoid Covenants and look for easier targets. Covenants encrypt your data with individual keys and grant access when compliance is assured. A data breach requires criminals to decrypt millions of individually encrypted and tracked data containers. 

Build Killer StUff

Development Professionals

Developers want better identity and data sharing infrastructure to build next generation immersive and personalized experiences without compromising privacy. Programmable data architectures balance data driven personalization with privacy priorities to build user configured and multi-platform choreographed digital experiences.  

Edge Compute & Edge AI

Edge Compute and Edge AI shift data processing as close to end users as possible for performance, security and privacy purpose. This enables data intensive workloads at the network edge closest to end users where security and privacy are best enforced and protected. 

Personalization CHOREOGRAPHy

Covenants enable your users to configure and control personalization of their choosing. They enable the choreography of personalized digital services across multiple organizations to serve each user’s unique needs.

Blockchain Interop

Smart Data Contracts  interoperate with blockchain smart contracts enabling hybrid solutions. Blockchains provide global marketplace scale data transactions while Covenants provide private and secure multiparty data transactions. Build revolutionary Dapps with hybrid capabilities.

Privacy Enhancing Technologies (PETs)

Programmable Data Architecture

Software Defined Networking (SDN), Storage (SDS), and Compute (SDC) can now interoperate with Software Defined Data (SDD). Automatically relocate data containers to ensure jurisdictional compliance and automate privacy and security requirements.

Simplified Data & Identity Sharing

A consistent data and identity sharing user experience grows trust and data exchange in a virtuous cycle. One consistent open source OAuth 2.0 user experience raises user confidence accelerating data sharing. 

Use Case Base Pricing

Covenants constrain the uses for the data returned from your applications and APIs. This allows use case pricing based on the value of the data transactions or digital services rather than priced the same service or API for all use cases. 

Intelligent CoMposable Applications

Intelligent Composable Business allows rapidly redesigned digital business moments, new business models, automation and new products, services and channels via modular data and application architectures. 

Software Defined Data Architecture

Data Professionals

Dynamically managing and controlling multi-party data flows with Smart Data Contracts ™ fundamentally transforms data management, governance and architecture. 

Rapidly redesigned digital business moments, new business models, automation and new products, services and channels requires adaptable software defined data architectures. Distributed data architectures necessitate distributed data management and governance capabilities. 

Covenants provide data regulation, policy, license, preference and terms of use contract enforcement while enabling trustable multi-party data ownership, data quality and data lineage.

Programmable Data Architecture

Software Defined Networking (SDN), Storage (SDS), and Compute (SDC) can now interoperate with Software Defined Data (SDD). Automatically relocate data containers to ensure jurisdictional compliance and automate privacy and security requirements.

Data Container Datastore

The Data Container Datastore can secure thousands of different tables, with thousands of fields, each with different datatypes and constraints, all automatically indexed for rapid retrieval, and all stored efficiently and compactly in a single disk file. 

High Data QUality with Multiparty Lineage

Imagine having 100% confidence in your data. Covenants automatically update when their Master Data Source updates. Data Lineage visibility can span across many organizations. Acting responsibly with other’s data ensures higher data quality for all downstream services.

Master Data Fabric

Master Data Fabric ™ tracks the data container lifecycle of all replicas, aggregates, physical locations, data lineage, and contract lineage. Data changes automatically version and update all downstream containers keeping all copies synced to the master data source.

Intelligent CoMposable Applications

Intelligent Composable Business allows rapidly redesigned digital business moments, new business models, automation and new products, services and channels via modular data and application architectures. 

~

Secure Data from Hackers

Criminals will avoid Covenants and look for easier targets. Covenants encrypt your data with individual keys and grant access when compliance is assured. A data breach requires criminals to decrypt millions of individually encrypted and tracked data containers. 

Data Container Tracking

Data Containers are registered and tracked with a Universal Unique Identifier (UUID) within the Master Data Fabric ™. The source URL and the Data Container location URL enable remote control, versioning, and auditing while tracking and enforcing global data and contract lineage. 

Bring Your Own Encryption (BYOE)

Secure your data with BYOE of your choice and keys you control. By design, Accesr can never access your data or enable others to access your data without your awareness and cooperation.