Circle Data

Data Privacy and Compliance

With Circle, NOBODY other than the Data Owner has access to their data - or metadata - EVER. Give your users the privacy and control that they, and governments, are demanding and deserve.

Circle's privacy-by-right architecture enables application developers and enterprises to maintain privacy and compliance simultaneously, meeting all the requirements of HIPAA, GDPR, CCPA, PIPEDA, PSD2, and more.


  • Liberate your company by giving the End Users control of their personal data
  • Enable users to communicate, share and collaborate with sensitive information safely
  • Have your identity verified without actually sharing private data
  • Secure private data across multiple personal devices
  • Provide and revoke third-party access to your personal data on your terms
  • Recover your access to private data securely and in a trusted way

Implement Data Privacy and Compliance with simple API configurations

Get started

The implementation of Data Privacy and Compliance will require

  1. Circle Desktop to enable Circle Service
  2. Circle Data API
  3. Circle Github

6 easy steps to enable Circle's Data Privacy and Compliance: 


Setup Circle Rest API


Initiate one time authentication with Circle Server to start Circle Service on your local machine


Setup your application and confirm by verifying communication


Get a Bearer Token for managing API sessions


Generate signatures for devices/ users


Create your own circle and invite users to it by two code validation process and share the data securely

For detailed steps of integration and implementation of Data Privacy and compliance of capabilities of Circle Data refer to

Circle Data Demo CTA

Demo: P2P file sharing

The demo illustrates the following areas of functionality.

  1. The secure E2EE exchange of files and data between users and devices with zero attack surface in the cloud.
  2. The creation of Circles, a private cryptographic network of devices possessing a unique AES 256 key, uses our direct out-of-band P2P authentication process.
We recommend that you read the demo tips before trying the demo.
Get Circle Access Desktop
Circle Access Desktop

You need Circle Service, part of the Circle Access Desktop thin client, to enable the following functionalities on the endpoint device.

  • AES 256 encrypted secure capsules to store any kind of data without any limit on the size
  • Keep private user data on endpoint devices but accessible to your applications.
  • Cloud backup, flexibility & resilience - but no keys.
Download now
Circle Data API
Circle Data API
Use Circle Data API to integrate and implement Data Protection, Privacy and control capabilities.
Learn more
Circle Github
View the code on Github
Go to our Github for code downloads, examples, modules and more.
Learn more

Support & Learning

The Data Protection, Control, and Privacy capabilities of Circle Data are implemented with Circle Data API. More advanced customer capabilities can leverage the Circle Data API with Circle Service and Secure Capsules on endpoint devices. Please contact us with your use case for a free consultation.


Check our FAQs and Troubleshooting tips, or post on our Forum


Learn more about the breakthrough architecture and principles of Circle Data, and the amazing ways it delivers Data Protection, Privacy and Control for Data Owners.