PLATFORM

Permission Controls

Our fine-grained permissions management ensures data owners remain in control of who can use their data in their analysis, and to what extent it can be analysed.

Book a demo
Permission Controls

The InfoSum Approach

What is it?

The permissions management within InfoSum’s Unified Data Platform (UDP) ensures the owner of each Bunker retains complete control over who can use the data in their analysis, and what can be learned from their data.

Permissions can be granted to other InfoSum users to use an Insight Bunker in their analysis. These permissions never grant access to the data within the Bunker, they simply allow them to learn what data categories exist within the data, use the data categories in their queries and run statistical analysis against the data.

Multiple levels of permission


Different permission levels can be granted depending on the nature of the relationship between the parties, and the analysis required. 

Level 1: View the meta-data and assess the intersection with other datasets
Level 2: Query the intersection of the dataset with another dataset
Level 3: Query the entire dataset

Control cross-dataset analysis

Permission controls can define whether the dataset can be analysed in combination with only the datasets owned by the recipient, or with any additional dataset they have permission to analyse.

Retract at anytime

Permissions can be withdrawn at any time and upon request are terminated instantly, with no further analysis possible. Due to non-movement of data within our UDP, no data has been transferred and therefore there has been no loss of control or commercial value.

InfoSum - never have to share your customers data again

WE DON’T OWN ANY DATA
WE DON’T OWN ANY DATA

We don’t hold any data. We provide the identity infrastructure to power a decentralised ecosystem.

YOU DON’T GIVE US ANY DATA
YOU DON’T GIVE US ANY DATA

Federated technology keeps your data in its own unique Bunker, that only you can access.

YOU DON’T GIVE US ANY DATA
YOU DON’T GIVE US ANY DATA

You remain in control of who can analyse your data. This never grants access to the raw data.

WE CONNECT DATA WITHOUT SHARING IT
WE CONNECT DATA WITHOUT SHARING IT

First-party data sets are matched using existing identifiers, removing the need to share data.

Insight Engine

Our proprietary Insight Engine generates a virtual database that enables multiple data sources to be analysed without moving, centralising or sharing data.

Learn more
CLOSE

Differential Privacy

We utilise differential privacy concepts during both analysis and activation to safeguard personal data and ensure no individual can ever be identified within our UDP.

Learn more
CLOSE

Identity Resolution

Our technology doesn’t rely on a single ID or identity graph. Instead it automatically determines the identifier, or combination of identifiers, within the dataset to create the optimal match.

Learn more
CLOSE

Permission Control

Our rich permissions management ensures data owners remain in control of who can use their data in their analysis, and to what extent it can be analysed.

Learn more
CLOSE

Global Schema

Our automated normalisation and mapping process ensures no changes are required to the original data to make it compatible across multiple data sources.

Learn more
CLOSE

Federated Architecture

Our UDP is built on a federated architecture that ensures all datasets remain decentralised in their own isolated Bunker, but can be analysed ‘as one’.

Learn more
CLOSE
Insight EngineDifferential PrivacyIdentity ResolutionPermission ControlsGlobal SchemaFederated Architecture