NEXYTE product description Page 13 user level requirements. This ensures data is used for authorized purposes only, by approved personnel. + User level permissions and lawful compliance. User permissions determine for each and every user their source permissions, access level (Create/Edit/Delete), and which functions they can perform (searches, data modeling, print, etc.). Strict access and usage permissions ensure investigators comply with all privacy and civil liberty laws. + Secure information sharing. Content and information can be securely shared while access permissions are enforced. + User authentication. Different authentication sources can be implemented including integration of enterprise LDAP. Organizations can retain existing enterprise authentication systems or implement NEXYTE’s authentication system. + User audit. The system logs and stores each data access, search, investigation and analysis action (export, print, create investigation, link or user, etc.) performed by all of the users. Auditing allows the tracking of data usage – not limited only to actions of a specific user but also general tracking of how a data item has been used, by whom and for what purposes. + Active security model. Regular security models often bind security permissions to content upon data ingestion, demanding heavy re-binding processes in the event of changes in the definition of permissions. Others use late binding techniques, where security permissions are bound upon content retrieval. In this case, content is retrieved wholly and only later filtered, which in case of error may result in a breach of security. The system implements a unique active security algorithm which supports a flexible and safe security model, with no performance reduction. NEXYTE active security mechanism uses unique query-time join technique that binds security permissions during the initial retrieval action, which results in high flexibility for permission changes and no risk of retrieving unauthorized content. 8.1.1 Permissions NEXYTE employs a fine-grained permissions model to manage levels of access permissions to data. Strict access and usage permissions ensure analysts and investigators comply with privacy regulations. Permissions are enforced on three axes: Data source – Defining the data sources from which a specific user can view data. Classification – Defining for each user the maximum classification level they are allowed to view. Investigation – In addition, it is possible to define specific investigations to which only selected users and groups are assigned. Every item of information is related to a specific data source and is defined with a classification. Every user is entitled to view specific data sources and will not be able to view data coming from sources which he does not have permissions for. In addition, every user has a classification and will be able to see information that has an equal or lower classification level.