Keyring Network | Docs
  • INTRODUCTION
    • About Us
    • Our Solution
    • Use Cases
  • USER GUIDE
    • 1. Choose a Policy
    • 2. Onboard
      • Keyring Connect
      • Keyring Pro
    • 3. Create a Credential
    • FAQ
      • What is my onboarding status?
      • How to manage multiple entities?
      • What is Keyring's business model?
      • How to create credentials x-chain?
  • INTEGRATION STEPS
    • 1. Create a Policy
      • Connect Policy Builder
    • 2. Integrate to User Flow
    • 3. Permission smart contracts
  • PROTOCOL GUIDE
    • Sandbox
      • Keyring Connect
      • Keyring Pro
    • Data Flow
      • Data Collected
      • Data Storage
    • Smart Contracts
  • RESOURCES
    • Links
    • Get in Touch
    • Brand Assets
    • Data Policies
  • Onboarding Requirements
    • Keyring Pro
      • FalconX
    • Keyring Connect
Powered by GitBook
On this page
  • Link to our Policies
  • Changes to our policies
  • How does Keyring protect my privacy?
  1. RESOURCES

Data Policies

PreviousBrand AssetsNextKeyring Pro

Last updated 3 months ago

Link to our Policies

Changes to our policies

Keyring Network keeps its Privacy and Cookie policies under regular review and places any updates on this web page.

How does Keyring protect my privacy?

As a compliance technology solution, Keyring is required to process and store sensitive information (including Personal Identifiable Information, “PII”) from individual and business users. As such, we strive to operate at the highest standard of security and privacy. Any data that is held, even temporarily, is managed by trusted custodians. These service providers adhere to stringent requirements, ensuring your information is handled responsibly and securely.

It's also imperative to ensure that compliance checks are conducted without leaving sensitive data breadcrumbs across the network. Through the use of cryptographic tools like Zero-Knowledge Proofs (ZKPs), it is possible to significantly reduce the risk of sensitive data exposure while ensuring robust data security. This involves (i) conducting compliance checks off-chain to prevent data leakage, and (ii) ensuring that only the necessary information is visible to the relevant parties for compliance and transaction monitoring, without evidently tracing it back to the original data.

Our solution leverages ZKPs, which allow a party, known as the prover, to demonstrate to another party, called the verifier, that they possess a certain piece of information or that a certain statement is true, without revealing any details about the information itself. We use ZKPs to attest to compliance status, in a modular and verifiable way. Users can prove they comply with a set of rules instead of having to expose their sensitive information to everyone, with all the risks entailed (doxing, hacking, data exploitation).

Privacy Policy
Cookie Policy