The permissions management within InfoSum’s identity infrastructure ensures the owner of each Bunker retains complete control over who can use the data in their analysis, and what can be learned from their data.
Permissions can be granted to other InfoSum users to use an Insight Bunker in their analysis. These permissions never grant access to the data within the Bunker, they simply allow them to learn what data categories exist within the data, use the data categories in their queries and run statistical analysis against the data.
Different permission levels can be granted depending on the nature of the relationship between the parties, and the analysis required.
Permission controls can define whether the dataset can be analysed in combination with only the datasets owned by the recipient, or with any additional dataset they have permission to analyse.
Permissions can be withdrawn at any time and upon request are terminated instantly, with no further analysis possible. Due to non-movement of data within our platform, no data has been transferred and therefore there has been no loss of control or commercial value.
We don’t hold any data. We provide the identity infrastructure to power a decentralised ecosystem.
Federated technology keeps your data in its own unique Bunker, that only you can access.
You remain in control of who can analyse your data. This never grants access to the raw data.
First-party data sets are matched using existing identifiers, removing the need to share data.
Our proprietary Insight Engine generates a virtual database that enables multiple data sources to be analysed without moving, centralising or sharing data.Learn more
We utilise differential privacy concepts during both analysis and activation to safeguard personal data and ensure no individual can ever be identified within our UDP.Learn more
Our technology doesn’t rely on a single ID or identity graph. Instead it automatically determines the identifier, or combination of identifiers, within the dataset to create the optimal match.Learn more
Our rich permissions management ensures data owners remain in control of who can use their data in their analysis, and to what extent it can be analysed.Learn more
Our automated normalisation and mapping process ensures no changes are required to the original data to make it compatible across multiple data sources.Learn more
Our UDP is built on a federated architecture that ensures all datasets remain decentralised in their own isolated Bunker, but can be analysed ‘as one’.Learn more