The absolute security of the Permission Code platform enables transaction data sharing
with outside parties.



  • There is a need to share data for collaboration, but also to ensure that access isn’t over entitled.


  • The data owner generates a Permission Code that limits types of data that can be shared – what, when and where. The API or portal authenticates the third party and checks their code against the data requested. Restricting access to this necessary information limits potential leakage and harm.



  • Information privacy concerns across the digital landscape will require information owners to create detailed records of their authorization to share specific data.

  • Such records are more complicated when authorization is delegated to a third party acting on the owner’s behalf, often through channels and at times when the three parties are not in contact.


  • Information owners provide the third party with a Permission Code PIN that details the identity of the third party, the information to be shared, and time the information is to be available.

  • The third party presents the PIN to the data holder, who can validate that the third party is authorized by the owner to receive the information and release the data with confidence.

Please reload