How would you know if your data was stolen or misused?

The GDPR requires you to put in place appropriate technical and organisational measures to safeguard the data that you process.

Data seeding complements the measures your organisation takes to reduce the risk of data loss by enabling you to track your data sets and giving you early warning if they are misused or made available for sale by cybercriminals.

We provide you with contact details for individuals in our data seeding network that you can insert into your databases. These individuals then notify us whenever their contact details are used.

Learn more about our data seeding services and solutions below 
Data Seeding Solutions

How does data seeding work?

Our data seeding team will work with you to design a data seeding programme tailored to your needs and requirements.

This programme will take into consideration:

The size and number of your datasets


The nature, context and purpose of the database



The nature and context of the recipients


The ways you use your data

The profile of the individuals and businesses in  your datasets



The ways in which your data is shared and processed


The kinds of activity you want to track

You will receive a detailed monthly report setting out the ways in which your data has been used, as agreed with you. This typically includes the channels that were used, the time and date on which the usage was identified and evidence of the use such as an image of a marketing campaign.

The data seeding process is sufficiently robust to use as evidence in a court of law, and we have a strong track record of supporting civil and criminal proceedings for theft and misuse of data.

What to expect

We will work with you to design a bespoke seeding programme that fits in with your data.

You will be allocated contact details for your data seeds that will need to be inserted into your datasets. You can manage this process yourself, or we can provide you with a fully managed service via our secure distribution portal. The contact details typically include:

  • Name;
  • Company name;
  • Phone number;
  • Email address; and
  • Postal address.

In the event that your data is stolen or misused, we are here to support you. We can help you to investigate and remediate the breach, protect your data subjects and take action against the party that caused it.

Bespoke Consultancy solutions

Other services of interest

BreachTrak

BreachTrak

Breachtrak monitors simple data sets to protect them against loss and theft. It is particularly beneficial for organisations who want to protect their valuable data assets – and the people the data relates to - against unauthorised intrusion.

Breachtrak includes enough data seeds to monitor one database and gives you early warning if your data is used in ways you don’t expect, or offered for sale by cybercriminals.

visit the breachtrak website

Bespoke Solutions

Make it your own

We can tailor your data seeding programme to your specific needs and requirements.

Examples include:

  • Expanding our data seed network to ensure it aligns to your demographic and geographic requirements
  • Creating tailored user profiles to blend with your ‘real’ users
  • Designing a programme that allows you to seed and track specific releases of data
  • Any other services, to meet your needs – just ask!

contact us