back to top ↑

How it works:
A quick overview of how IDLink solves the demand for delivering data

1

The consumer requests his data, is authenticated, and the request appears in IDLink

1

The consumer requests his data, is authenticated, and the request appears in IDLink

2

Information about the consumer can be collected by APIs, by entering data into forms, or by simply dragging and dropping files.

3

The data is encrypted, and a ‘key’ is delivered, allowing only the authenticated user to unlock the data

4

The consumer can download his data in a structured, machine-readable format.  After 32 days, his data is permanently removed from IDLink.

5

IDLink also allows data to be safely sent between companies with customer consent.

Plans to suit every organization

All plans offer a free trial, and include:

  • Complete audit log
  • Four-eye approval
  • 4096-bit encryption
  • & more
© 2018 Safe Online