TECHNOLOGY IS READY, ARE YOU?
In today's age of hacking and cyber warfare, ensuring that access to sensitive information is controlled is extremely important. Yet, control should not come at the cost of efficiency. Trust networks ensure information is shared with people on a need to know basis. It also reduces the cost and time resulting of manual reconciliation.
No technology holds a greater promise towards this that distributed ledger technology / DLT.
DLT VALUE PROPOSITION
We believe in the power of DLT. Some of the public DLT implementations are inefficient and lead to a lot of duplication. We support permissioned DLT's, which are not open to the public, but to the relevant stakeholders. Even within the DLT, we believe on sharing data on a need to know basis. The key objective is to reduce reconciliation effort and cost between systems. Additionally, certain key processes, like Know Your Customer (KYC) need not be conducted multiple times by multiple parties. The key concepts like non-repudiation, smart contracts, shared truth, cryptography, and consensus make DLT an ideal choice for new age financial system. The challenge for the industry is get past the rhetoric and hype of implementations like Bitcoin and focus on the true power of the technology.
1. Security: Data stored on the DLT is secured by cryptography. Public key infrastructure or PKI used to ensure authorized access to the system and permissions. Additionally, transactions are encrypted end-to-end, preventing unauthorized access during transit.
2. Privacy: With a secured authentication system based on digital public key identity and seconded by OTP verification, there is limited opportunity for unauthorized access to personal data. Furthermore, the permission based system gives individuals greater control in updating and disclosing their data.
3. Non-repudiation & immutability: Once entered, data on the DLT cannot be altered retroactively.
4. Traceability and auditability: Provides a single source of truth for data and related transactions. Enables easy reporting on data and transactions whether for internal or external (like for regulatory organization) purposes.
5. Data integrity: Each participant saves transaction data pertaining to it. This data is also saved consistently on the ledger of other nodes participating in the transaction.
6. Data Accuracy: Individual's data is either provided or approved by identity qualified federal entities. There is limited room for errors due by manual data entry.
7. Processes automation &effectiveness: Workflow routing can be coded into smart contracts and standardized across the participating members, thereby streamlining the KYC verification procedures. This will increase the effectiveness as it reduces the need for manual oversight.