Circle Data

Privacy Assurance

With Circle, NOBODY other than the Data Owner has access to their data - or metadata - EVER

Data privacy and security regulations are becoming more strict day by day and failure to adhere to then could cost millions of dollars to an enterprise.

Circle's privacy-by-right architecture enables application developers and enterprises to maintain privacy and compliance simultaneously, meeting all the requirements of HIPAA, GDPR, CCPA, PIPEDA, PSD2 and more.

Start Securing Now
Circle Secure Capsules

Liberate your company by giving the end user control of their personal data

The requirement of privacy laws such as GDPR, CCPA, and HIPAA put enormous burdens on company's that handle sensitive end user data.

By leveraging Secure Capsules, enterprises can give end users the power to secure and control their personal data on endpoint devices.

Now you can ensure compliance with ZERO overhead for complex and costly steps to track and then remove user's personal data.

Your application - and company - can never be the source of breach because you never have data in an unencrypted state - except when it is consumed by the end user on their own devices

Safely communicate, share and collaborate with sensitive information

End user or data owner controls data visibility of ePHI, PII, and any sensitive or private data. This combined with Circle's key management system the data owner can share and communicate data in an encrypted format with which only the desirable users will have visibility to the data and no one else

Have your identity verified without actually sharing private data

Thanks to Circle's encrypted Secure Capsules and zero knowledge encryption, users can share personal data in encrypted hashes without actually sharing PII.

Secure private data across multiple personal devices

Securely replicate your personal data across your other owned devices using Circle's unspoofable out-of-band peer-to-peer authentication to share encryption keys.

Provide and revoke third-party access to your personal data on your terms

Share your personal data with third-parties on your terms and be in control of that sharing all the time. Revoke access to your data to third-parties when your relationship ends or when the situation warrants.

Recover your access to private data securely and in a trusted way

Iron clad security usually has a dark side. If the credentials, passphrase, hardware tokens are lost, access to critical and valuable digital assets and data can be lost forever.

Circle-of-Trust™ enables users to set up private networks of trusted persons they know who can authorize and restore access to encrypted keys, but never use them directly.

With Circle, users can have peace of mind knowing that access to their most confidential data is completely secure, but always recoverable.
Circle Data Demo CTA

Demo: P2P file sharing

The demo illustrates the following areas of functionality.

  1. The secure E2EE exchange of files and data between users and devices with zero attack surface in the cloud.
  2. The creation of Circles, a cryptographic private network of devices defined by the possession of a unique AES 256 key, using our direct out-of-band P2P authentication process.
We recommend that you read the demo tips before trying the demo.