The implementation of Data Privacy and Compliance will require
6 easy steps to enable Circle's Data Privacy and Compliance:
Setup Circle Rest API
Initiate one time authentication with Circle Server to start Circle Service on your local machine
Setup your application and confirm by verifying communication
Get a Bearer Token for managing API sessions
Generate signatures for devices/ users
Create your own circle and invite users to it by two code validation process and share the data securely
For detailed steps of integration and implementation of Data Privacy and compliance of capabilities of Circle Data refer to
The demo illustrates the following areas of functionality.
You need Circle Service, part of the Circle Access Desktop thin client, to enable the following functionalities on the endpoint device.
The Data Protection, Control, and Privacy capabilities of Circle Data are implemented with Circle Data API. More advanced customer capabilities can leverage the Circle Data API with Circle Service and Secure Capsules on endpoint devices. Please contact us with your use case for a free consultation.
Check our FAQs and Troubleshooting tips, or post on our Forum
Learn more about the breakthrough architecture and principles of Circle Data, and the amazing ways it delivers Data Protection, Privacy and Control for Data Owners.