Privacy

•Subject controls who has access to their personal information

•Full immutable history of who has seen, created, or updated documents

Authentication

•Documents cannot be altered without detection

•Documents can be certified by multiple parties

Security

•Documents can’t be viewed by hacking one repository

•Documents can be recovered if a repository is compromised