Privacy
•Subject controls who has access to their personal information
•Full immutable history of who has seen, created, or updated documents
Authentication
•Documents cannot be altered without detection
•Documents can be certified by multiple parties
Security
•Documents can’t be viewed by hacking one repository
•Documents can be recovered if a repository is compromised