One of the main problems that businesses, organizations and institutions face, is the low control over the illicit distribution of confidential information.
To identify the source of the leakage or improper distribution of high value documental assets is one of the main cases where our technology is used.
The unambiguous identification of the original document, on top of the hidden and unbreakable codification of data from each of the copy recipients, allows for a robust and effective traceability. This technology is already used in the cinema, music, financial, academic, political, legal and intellectual property industries, among others, to enable the source of the leak to be identified.
- Copy source identification and illegally downloaded cloud document (academic papers, books, reports etc.) distribution.
- Leakage source identification for confidential information in legal processes.
- Source document identification in the case of unauthorized copy and use of material protected by intellectual property.