iTraceiT Data Management System
Estimated Reading Time: 2 MinutesThe iTraceiT Data Management System is designed to ensure data security, integrity, and compliance with stringent regulations. Here's an in-depth look at how iTraceiT manages data:
1. Data Management
- Dedicated Databases: Each iTraceiT domain operates its own dedicated database, utilizing a proprietary database management system (DBMS) that is not open source.
- Encryption and GDPR Compliance: All personal and sensitive data are encrypted to meet GDPR compliance requirements, ensuring data protection and privacy.
- Exclusive Data Access: Access to the data is managed exclusively through web services servers, ensuring that the data remains the exclusive property of the client.
- Double UID System: Every entity within the system is assigned a double Unique Identifier (UID) to facilitate rigorous activity and access logging.
- Enhanced Data Protection: Data can be further protected with passwords and additional encryption layers, providing an extra level of security.
2. Database Structure
- Field Types: The database consists of two types of fields: metadata and client data. Sensitive client data is encrypted to protect against unauthorized access.
- Secure Communications: All communications are secured via SSL, ensuring that no information is stored on applications and that data in transit is protected.
- Stateless Web Service: Operations and data access are managed through a stateless web service, which verifies authorization with each call to maintain security and efficiency.
3. Blockchain iTraceiT & Logion
- Enhanced Security through Blockchain: The use of encryption and decentralization through blockchain technology provides enhanced security for the data.
- Selective Data Export: Managers have the ability to select specific data for export, including additional fields as needed.
- IPFS Network and Legal Oversight: Data certified by Logion is protected in an InterPlanetary File System (IPFS) network, which is overseen by Legal Officers to ensure data integrity and legal compliance.
4. Infrastructure
- AWS Hosting: The system is hosted on Amazon Web Services (AWS), which is compliant with SOC 2 and ISO/IEC security standards.
- European Servers: Servers are located in Europe, ensuring secured access through the use of digital certificates and encrypted disks.
- Regular Backups and Restricted Access: Regular backups are conducted to safeguard data, and server access is restricted to authorized personnel only.