Circle Data

Privacy Assurance

With Circle, NOBODY other than the Data Owner has access to their data - or metadata - EVER


Data privacy and security regulations are becoming more strict day by day and failure to adhere to them could cost enterprises millions of dollars.

Circle's privacy-by-right architecture enables application developers and enterprises to maintain privacy and compliance simultaneously, meeting all the requirements of HIPAA, GDPR, CCPA, PIPEDA, PSD2, and more.

Start Securing Now
Circle Secure Capsules

Liberate your company by giving the end user control of their personal data

The requirement of privacy laws such as GDPR, CCPA, and HIPAA puts enormous burdens on companies that handle sensitive end-user data.

By leveraging Secure Capsules, enterprises can give end users the power to secure and control their personal data on endpoint devices.

Now you can ensure compliance with ZERO overhead for complex and costly steps to track and remove users' personal data.

Your application - and company - can never be the source of the breach because you never have data in an unencrypted state - except when the end-user consumes it on their own devices.

Safely communicate, share and collaborate with sensitive information

The end user or data owner controls the data visibility of ePHI, PII, and any sensitive or private data. This, combined with Circle's key management system, the data owner can share and communicate in an encrypted manner with desired users only.

Have your identity verified without actually sharing private data

Thanks to Circle's encrypted Secure Capsules and zero-knowledge encryption, users can share personal data in encrypted hashes without sharing PII.

Secure private data across multiple personal devices

Securely replicate your personal data across your other owned devices using Circle's unspoofable out-of-band peer-to-peer authentication to share encryption keys.

Provide and revoke third-party access to your personal data on your terms

Share your personal data with third parties on your terms and be in control all the time. Revoke third-party's access to data when your relationship ends or when the situation warrants.

Recover your access to private data securely and in a trusted way

Ironclad security usually has a dark side. If the credentials, passphrase, and hardware tokens are lost, access to critical and valuable digital assets and data can be lost forever.

Circle-of-Trust™ enables users to set up private networks of trusted persons they know who can authorize and restore access to encrypted keys but never use them directly.

With Circle, users can have peace of mind knowing that access to their most confidential data is entirely secure but always recoverable.
Circle Data Demo CTA

Demo: P2P file sharing

The demo illustrates the following areas of functionality.

  1. The secure E2EE exchange of files and data between users and devices with zero attack surface in the cloud.
  2. The creation of Circles, a private cryptographic network of devices defined by possessing a unique AES 256 key, uses our direct out-of-band P2P authentication process.
We recommend that you read the demo tips before trying the demo.