Data Trusts provide access to big data and allow aggregation on a suitably anonymized basis

A Data Trust is a framework for collecting, coalescing, enriching, and sharing data. A Data Trust is normally established by an intermediary with fiduciary responsibilities to its data depositors and subject to strong disclosure or governance obligations that provide privacy controls and data sharing agreements to the consumers. Data Trusts provide access to big data and allow aggregation on a suitably anonymized basis. By combining and enriching information into a Data Trust with the right duty of care, a better understanding of the data can be developed. 

Data Trusts can further accelerate the creation of innovative products and services by providing access to curated data assets while maintaining integrity and oversight into how the data is being used and by whom.

Tehama Ensures Data Integrity for Data Trusts

Using Tehama as the entry point for consumers, the Data Trust owners have full dominion over the data. Within Tehama the Data Trust controls the use of the information, what can be viewed or exported, when it can be viewed or exported, and by whom. With Tehama’s continuous auditing the Data Trust owners can also ensure compliance with perfectly witnessed logs and recordings to know what data has been viewed, who viewed the data, what they did with the data, and when the data was viewed.

Tehama’s deep security and compliance creates confidence between the Data Trust and their data depositors as Tehama can manage the strong disclosure and governance obligations and privacy controls.
Icon of a court house

Regulatory Compliance
Benefit from Tehama’s
SOC 2 Type II compliant platform which comes with 107 SOC controls already built-in. 

Icon of a movie camera
Deep Forensic Auditing
Deep forensic auditing and compliance for secure access and monitoring of a global workforce 24 x 7.
Icon of a desktop window with code
Virtual Workspaces On-Demand
Launch “ready-to-work” complete and productive work environments — in minutes, not months.
Icon of a lock with connected dots around it

Secure Connectivity
Eliminate credential theft and lateral network movement associated with VPN access.

Icon of a cloud
No More Shipping Laptops
Reduce costs and delays by avoiding IT infrastructure procurement and deployment.