Replies: 1 comment 4 replies
-
you cannot. full stop. that is not meant by "Data Sovereignty", nor is it the goal of EDC. Theoretically, there could be trusted execution environments, for example signed docker images, that "emit" the data, and stop emitting, once a certain condition is not met anymore, but from the perspective of EDC, such an image would just be a data asset. And it would bring on another different host of problems.... So in short: as soon as data leaves your purview, it's gone, and you have no control over it anymore. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
We are getting this question quite often "If a dataspace participant moves data out of the dataspace (e.g., downloads it for offline use), how can control over the data and technical enforcement be maintained?"
For instance, when a provider wants to share a CSV file, if the consumer downloads the data and leaves the trusted environment, traditional access controls become ineffective.
Beta Was this translation helpful? Give feedback.
All reactions