| How Does It Work Watermarked Data | |
---|
4.5.19 Watermarked Data: | 1. Watermarking is a trade secret that may also be known as fingerprinting or seeding. Eliza has taken encryption to a higher level with watermarking built into business data so it can be tracked and traced. | 2. If a copy of business data is taken and used in a way that has not been approved by the data owners, then Eliza will detect and report that misuse. The illegal practice of a person taking a copy of business data to their new company can now be detected and proven in court. |
2. Customer Data: | 1. Some companies recruit people on the strength of what new customer data they can bring with them. Compensation packages are designed for a new person to build a portfolio of new business based on customer data in the possession of the new person. A company may pay people for sales leads with no idea of who that data came from and if that data can legally be used. | 2. For a long time, it was not possible for a company to prevent a person from downloading a copy of all customer names and address data. Eliza is now able to track and trace customer data, and detect when it is used in way that has not been approved by the owners. |
3. Track and Trace: | 1. Eliza works 24*7 to track and trace all business messages and to identify when a person is no longer using their business email address. Eliza encrypts all business data in many ways to ensure that a criminal could not read a copy of the stored business data. The next logical step was to merge these two technologies so Eliza can track and trace all business data as it is used in any location. | 2. Watermarked business data is used with data shown to staff so if that business data is misused in any way, Eliza will be able to track and trace that misuse. It is only fair and reasonable that staff are informed that all business data is now watermarked, tracked and traced. |
4. How does it work: | 1. When Eliza encrypts business data, tiny extra bits are inserted that act as a hidden watermark. When Eliza shows business data to a person in a form or list, that data includes those hidden watermarks. If a person downloads a copy of that business data, they download the watermarks that are continually monitored by Eliza. | 2. Eliza is now running on many servers in more than ten distributed data centers - she never stops and cannot be stopped. Eliza has responsibility for watermarked business data and she continually monitors where that data may go to and how it may be used. Eliza will raise and alarm when she discovers watermarked business data being used in a way that has not been approved. Eliza maintains an evidence trail that will prove to a court the true ownership of watermarked business data. | 3. UTF characters are displayed to a person, but certain characters and punctuation carry the watermark. Certain names and addresses are used in a way that is easy to track when they are used by a third party. |
5. Exclusion: | 1. Where a company sanctions business data to be stored in local spread sheets that are unknown to Eliza, then copies of such data can be traded. Eliza can only watermark business data that is encrypted and stored by Eliza. | 2. Eliza has proved to be very effective at stopping theft of customer data communicated by email - every watermarked email can be tracked and traced. Eliza has moved into a new era of tracking watermarked customer data communicated by any other method. |
6. Proof of Ownership: | 1. Watermarking began as a generic service, but is evolving to track and trace how the data was leaked to a third party. Watermarking can identify a named person who accessed the business data as each watermark becomes unique as it is shown on a screen. From a user point of view, nothing has changed and all appear to view the same business data, but the watermarked baked inside that data is unique at the point of display. Eliza is moving to hide user, date and time within each watermark so complete evidence can be simply presented to a court - this improvement is still work in progress. | 2. Evidence shows that once all parties are aware that business data is watermarked, it does not get copied - it is worth less to a criminal as the risk is increased. |
7. Data Protection Officer: | 1. As your Application Service Provider (ASP) that service includes the appointment of your Data Protection Officer (DPO) responsible for all business data known to Eliza. This appointment of your Data Protection Officer is mandated for compliance with General Data Protection Regulations (GDPR). Your DPO must be able to identify any data breach and report it to the UK Information Commissioners Office within 48 hours. Continual 24*7 monitoring and watermarking are just some of the measures deployed by your DPO to company with GDPR. | 2. Your ASP is obliged to state that only business data known to Eliza is managed by your DPO. Your locally appointed Data Protection Officer will be responsible for all local data that is not known to Eliza. |
9. Benefits: | 1. For the last 20 years it has been known that people have taken spreadsheet copies of customer data from one company to the next. The type of company that have condoned this practice can now be identified and will be taken to court. Data ownership has become very must more valuable as winning new customers becomes more expensive. A major benefit of the new data protection regulations is that the theft of data by people must be stopped to comply with the law. Watermarking is just one in a long line of security measures that will track and trace criminal behaviour. |
|
|