Data Trusts

Data Trusts provide access to big data and allow aggregation on a suitably anonymized basis

A Data Trust is a framework for collecting, coalescing, enriching, and sharing data. A Data Trust is normally established by an intermediary with fiduciary responsibilities to its data depositors and subject to strong disclosure or governance obligations that provide privacy controls and data sharing agreements to the consumers. Data Trusts provide access to big data and allow aggregation on a suitably anonymized basis. By combining and enriching information into a Data Trust with the right duty of care, a better understanding of the data can be developed. 

Data Trusts can further accelerate the creation of innovative products and services by providing access to curated data assets while maintaining integrity and oversight into how the data is being used and by whom.

Tehama Ensures Data Integrity for Data Trusts

Using Tehama as the entry point for consumers, the Data Trust owners have full dominion over the data. Within Tehama the Data Trust controls the use of the information, what can be viewed or exported, when it can be viewed or exported, and by whom. With Tehama’s continuous auditing the Data Trust owners can also ensure compliance with perfectly witnessed logs and recordings to know what data has been viewed, who viewed the data, what they did with the data, and when the data was viewed.

Tehama’s deep security and compliance creates confidence between the Data Trust and their data depositors as Tehama can manage the strong disclosure and governance obligations and privacy controls.
Regulatory Compliance
Benefit from Tehama’s
SOC 2 Type II compliant platform which comes with 105 SOC controls already built-in. 
Deep Forensic Auditing
Deep forensic auditing and compliance for secure access and monitoring of a global workforce 24 x 7.
Virtual Workspaces On-Demand
Launch “ready-to-work” complete and productive work environments — in minutes, not months.

Secure Connectivity
Eliminate credential theft and lateral network movement associated with VPN access.

No More Shipping Laptops
Reduce costs and delays by avoiding IT infrastructure procurement and deployment.