ENCRYPTED DATA AS A SERVICE (EDaaS) • USE CONFIDENTIAL DATA WHILE ENCRYPTED AND AS A SERVICE • DATA SHOULD NEVER BE DECRYPTED OR SHARED WITHOUT ENCRYPTION • OWNERSHIP SHOULD REMAIN WITH DATA/ALGORITHM OWNERS, WHO SHOULD BE ABLE TO CONTROL HOW THEIR DATA/ALGORITHM GETS USED AND REVOKE ACCESS WHENEVER THEY CHOOSE CONFIDENTIAL 6
USEncryption - Pitch Deck Page 5 Page 7