# Data Management

## Overview

Circular is designed to certify data without ever exposing or storing the underlying content on the blockchain. Instead of embedding files or datasets directly on-chain, Circular uses cryptographic hashing to generate a secure fingerprint of the data. This preserves privacy while ensuring tamper-evident traceability.

This approach makes it possible to verify the authenticity of any document, dataset, or digital artifact without needing to access its raw content.

## How It Works

### When a certificate is issued:

1. The data (document, file, or record) is hashed locally using a secure algorithm like SHA-256.
2. Only the resulting hash, a unique, fixed-length string representing the data is stored on Circular’s distributed ledger.
3. The original data can be hosted anywhere: on your infrastructure, a private cloud, or a secure data lake.
4. To verify authenticity later, anyone can rehash the original file and compare it to the one stored on-chain. If the hashes match, the data is verified.

### What Gets Stored on the Network

* Cryptographic hash of the certified file or data
* Issuer identity (account ID)
* Timestamp of issuance
* Optional metadata (file type, name, description)
* Certificate ID and associated record

### What Does Not Get Stored

* The actual file contents
* Personal or sensitive data
* Unencrypted source material or documentation

### Benefits of Off-Chain Storage

#### Data Privacy:&#x20;

Sensitive content stays within your secure environment and never touches the blockchain.

#### Scalability:&#x20;

Certificates remain lightweight, making the system fast and efficient to query and verify.

#### Compliance:&#x20;

Keeping private data off-chain supports HIPAA, GDPR, and other global privacy frameworks.

#### Flexibility:&#x20;

You choose where and how the data is stored, while still gaining the benefits of blockchain-grade verifiability.

## Use Cases

### Clinical Trials

Certify protocols, results, and documentation without exposing patient information.

### AI Datasets

Anchor AI training datasets with verifiable fingerprints to ensure integrity during model validation or audit.

### Scientific Research

Timestamp and certify publication drafts, lab results, or raw data while retaining full control over storage.

### Supply Chain

Certify shipping manifests or batch-level manufacturing data while storing the contents securely elsewhere.

## Verifying Data

### To verify a record:

1. Recompute the hash of the original file using the same algorithm (e.g., SHA-256).
2. Compare it against the hash recorded on Circular.
3. If the two match exactly, the data is confirmed to be authentic and unmodified since certification.

This allows data verification to occur independently, without needing access to a third party or the original issuer.

## Summary

Circular decouples the storage of sensitive data from its certification. By anchoring only the fingerprint of data on-chain, organizations gain full transparency and proof of integrity — without compromising control, compliance, or confidentiality.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://circular-protocol.gitbook.io/circular-protocol-documentation/data-management.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
