Safe
Data owner remains in control
Within the BDI, data isn’t stored elsewhere; it remains at the source, where other parties can view it. The data owner can decide when certain parties are given access to certain parts of the data. This ensures that parties only get the information they need and nothing else. One example: a driver only receives information about the starting point, the final destination and generic information about the cargo. A customs officer, on the other hand, will see more specific data about the cargo and the various buyers and sellers. The system also includes an option to check when data access was requested and used. This ensures that the data owner remains in full control.
Not dependent on a single central party
Within the BDI, data is stored at the source rather than in one central location, so there is no ‘single point of failure’, like you have with a platform. If access to one of the systems is deliberately or accidentally made impossible, the other data sources will still be available. This makes the BDI less sensitive to things like system defects or cyberattacks.
Strict security standards
Strict security has a central place in the BDI. Both individual systems and the interactions between these systems comply with strict security standards. Every data exchange is also recorded in a log, so that a possible breach can be quickly traced and a resolution can be quickly found. This ensures that data can be exchanged without worry, even if it is sensitive.