DigiCoffer Personal
DigiCoffer enables individuals to take control of the critical parts of their digital life. It provides a safe and secure environment to validate and manage privacy information, digitized credentials like passports and personal digital assets (Wills, Tax Returns, etc.).

DigiCoffer empowers the individuals to make decision on sharing their privacy information and digital assets with the business entities they do business with or would like to establish a new business relationship. Business entities include professional service providers (lawyers, accountants etc.) and traditional businesses (financial institutions, retailers etc.). Individuals can choose what information they want to share with the business entitiesand how long they want to share them.

Through DigiCoffer one can have a view into his/her business relationships, terms & conditions associated with the relationship and he/she can have the visibility into the audit trail and sharing status of their information/digital assets.
Personal Information
DigiCoffer provides safe and secure capability for individuals to store and manage their personally identifiable information. It will also validate the accuracy of information and have mechanisms to keep the information current.

DigiCoffer data is categorized under appropriate country for persons with dual citizenships and/or permanent resident statuses
Digitized Credentials
Digitized credential documents like passport, drivers license etc. can be verified by appropriate authoritative sources and stored securely in DigiCoffer.

Similar to the personal information the digitized credentials are also categorized under appropriate country for individuals affiliated with multiple countries with dual citizenships and/or permanent residencies
Personal Digital Documents
Digitized versions of important personal documents (ex: wills, tax returns, education certificates etc.) can also be managed in DigiCoffer. These documents are also categorized under appropriate country for people with affiliations to multiple countries.

Personal documents created by professionals ( Lawyers, Accountants etc.) can be securely accessed by the individual clients
Online Business Relationships
Product & service relationships with the businesses registered with DigiCoffer including the terms and conditions associated with the relationships are managed in DigiCoffer.

The individuals will have the ability to share their information, credentials and personal documents with businesses they intend to establish new relationship for short period of time
DigiCoffer For Individuals Video
Online Safety & Security for Everyone

Information, Tips and Tools

Brought to You by DigiCoffer


Online safety and security require us at a minimum to learn and act on Access Protection, Data Protection and Device Protection best practices
    1. Access Protection:
    In order to get access to a secure application we need prove our identity through passwords, biometrics, tokens or other methods. This process is called authentication. Highly secure applications require more than one type of authentication, generally called multi-factor authentication.
  • Password
  • Passwords are widely used for authentication. There are many password best practices available to prevent bad actors from getting un-authorized access to our applications.

    Password Manager tools make it easy for everyone to apply password best practices for creating and managing strong passwords. DigiCoffer recommends open source password manager Keepass. You can download and use Keepass instructions created by DigiCoffer.
  • Biometrics:
  • Biometrics (finger prints, iris recognition, facial recognition) is used a method of authentication finger print scanner of a smart phone is a good example
    2. Data Protection:
    Personally identifiable as well as confidential data and documents need to be protected when it is stored, viewed on a device and when it is traveling through the networks. Further it is essential for individuals to have control over their data. Generally, many businesses are required to comply with privacy regulations across the globe. Encryption, hashing and masking are the common data protection methods.
    Through Masking the data on a device screen is masked by special characters like asterisks (***) or dots (….).
    Hashing and encryption use hash functions and encryption algorithms to convert readable text into an unreadable output. It is impossible to turn hash back to the original text. But encrypted text can be converted to original text using key (s), this process is called decryption.
    3. Personal Device Protection:
    Protecting personal devices from viruses, malware and other security threats is very important. This can be accomplished by installing commercially available security software. Keeping the security software up to date is essential to get protection from latest security threats.