TARTLE is the world’s first and truly global personal data marketplace. It is a system that brings anonymous parties together to exchange digital information (data) for digital currency (bitcoin). This source information (owned + created by individuals) is important for creating new financial opportunities from the digital identity, establishing a means of digital rights and relinquishment when individuals agree to do so, and an access point to research and solve the worlds most difficult challenges by creating a market place for ‘source’ data.
TARTLE is free to join forever. Creating an account only takes moments and you can begin selling or bidding on data as frequently as you like. The choice is yours!
This is part privacy and part philosophical. We at TARTLE believe that names are incredibly important and can help tell the story of an individual. So important in fact that we removed them from the system. This is a measure to keep you as anonymous as possible and as a means to level the playing field. As human beings it is difficult to pass judgment on someone and just reading a name alone can put people in boxes they don’t belong in. Everyone has important thoughts, feelings, ideas, and identities so by eliminating public names, it makes the value of the digital identity as a base level – even. It shouldn’t matter what corner of this big blue jewel you are from, when every digital identity is equally as special.
A data packet is a piece of your digital identity. Source data that couldn’t be any closer to the individual than the individual themselves. Data packets are what are actively traded on the TARTLE exchange and each data packet has its own value on this open market. They come in all shapes and sizes and you can choose which pieces of data you want to fill/sell or bid on as you please, and as frequently as you choose to do so.
The TARTLE Wallet is your best friend. It is the completely secure digital wallet for buying and selling goods and services using digital currency (cryptocurrency). The wallet allows you to be your own bank! No paperwork, no monthly fees, no bank, no lines, no waste. The TARTLE Wallet is where you can deposit, withdraw, spend and transfer your digital currency for Data Packets on the exchange or goods and services anywhere in the world. A truly global means for commerce and accessibility to financial services.
If you would like to purchase funds for your account to bid on data packets on the exchange or use for goods and services where accepted, please visit: https://bitcoin.org/en/exchanges
From the bitcoin exchanges here you can use your home currency to purchase digital currency from any of the bitcoin exchanges, and then deposit those funds into your TARTLE wallet by pasting the wallet address in the recipient address box.
1 – Go to the mobile web app via your preferred mobile web browser.
2 – Select the share button [Square with the Upward Arrow] found on the bottom of your web browser screen.
3 – Select ‘Add to Home Screen’
1 – Go to the mobile web app via your preferred mobile web browser
2 – Select ‘Menu’
3 – Select ‘Add to Home Screen’
The best way to generate more value for your data is to make sure you have your data packets updated all the time with the most relevant, truthful, and precise information about your digital identity. This will ensure better stability of pricing for everyone, and help with the continuation of the exchanges value in bringing source data efficiently to the world.
Remember, the more frequently you visit the exchange, integrate with your favorite apps and devices, fill out new and current data packets, and accept bids for your data, the more your identity will be worth over time.
Easy as Join – Fill – Sell! Create an account through the exchange system. Select the relevant data packets you want to fill out. Enter in the appropriate information, save the data in the packet, and wait for a notification to come in under the ‘Bids’ tab that someone is looking to purchase your data. It is that simple!
Easy as Create – Bid – Analyze! Create an account through the buyer terminal. Make sure you fund your account by selecting the wallet icon in the top right corner of the dashboard. Then search for the data category or packet your wish to access source data on. Select ‘Make bid’. Enter your terms. Hit continue and wait for the information to come rolling in!
We’re so glad you asked!
Single Use Bid – A single use bid is a one time bid on a specific data packet from a buyer to a seller on the exchange. The transaction begins with the bid and once accepted the agreement between buyer and seller is complete and the transaction terminates. There is no continued agreement between the buyer and seller. The seller receives the one-time compensation for their data, and the buyer receives the data packet information in a clean, ready-to-analyze .csv file format.
Subscription Use Bid – A subscription use bid functions at its core much just like a single use bid. The difference is the subscription use bid is a bid that comes with a term and frequency agreement from the bidder to the seller. This means that the bid, if accepted, will continually transfer a data packet to the buyer for a set period of time and frequency, and in return the seller receives funds for the data each period that the data is transferred within the initial agreement. Essentially multiple single use bids strung together over time. Again, the seller receives the compensation for their data, and the buyer receives the data packet information in a clean, ready-to-analyze .csv file format.
You bet! We don’t have all the answers, but the world does. If you would like to suggest a data category or data packet to bid or sell:
From the buyer terminal – Look in the upper left corner under the logo and you will see a “+” sign. Here is where you can suggest data categories or data packets you would like to have added on the exchange to be bid on.
From the mobile web app – Look on the Packets Tab in the top right corner. You will see “+Suggest” . Here is where you will be able to choose a data category and packet you would like to have added to the system to sell your digital identity on.
Of course not! You have every ‘right’ to use it if you want to. The VPN (Virtual Private Network) is designed to keep your internet traffic encrypted and anonymous while using TARTLE. That way any peering eyes will find it terribly difficult to steal your information in transit or pinpoint your geography while on your devices. Its an extra layer of security completely for your benefit.
Every data seller transaction on the marketplace, where a seller releases a data packet of information to a buyer, receives 100% of the stated value of the bid for that data packet.
As a data buyer active in purchasing data packets from sellers on the global marketplace, a data buyer pays the bid price for the data packet, plus an extremely small data fee which TARTLE collects to support the data marketplace ecosystem.
Bitcoin | Crypto-currency | Virtual Currency
Bitcoin is a decentralized virtual currency. This means it can be used to pay for good and services like the paper money we use today that will soon become a thing of the past. Bitcoin is not issued by any central bank or authority, it is supported by a vast global network of ‘nodes’ maintained by individuals all over the globe.
We at TARTLE believe that Bitcoin is the future. Like your data, you own it completely. Therefor, the same should be said for your money. Using Bitcoin as our main currency means economic opportunity is truly global when using the TARTLE marketplace exchange our data and receive Bitcoin in return. Bitcoin also allows us to incorporate anyone on the internet to use the TARTLE marketplace regardless of geography or nation.
Using a fiat currency would be hypocritical to our mission, system architecture, and values. Fiat currency is also a system that is exclusive and designed to benefit select individuals globally. We believe power and control should be in the hands of regular people, just like their data.
This question is better answered with a video! Watch below:
Tax implications of using bitcoin/cryptocurrency/virtual currency are dependent on the geographic location of a user, and the laws determined by the nation/state of said user of bitcoin/cryptocurrency/virtual currency.
In terms of United States IRS Tax Policy, TARTLE contacted the IRS Department of Income Tax & Accounting, Office of Associate Chief Counsel on January 24, 2020 7:54 AM MST regarding IRS Notice 2014-21; to gain clarification on the tax policy regarding wallet to wallet transfers of bitcoin. The IRS responded stating that, Wallet to Wallet transfer of bitcoin are Non-taxable in the eye of the IRS. The IRS considers bitcoin/cryptocurrency/virtual currency as ‘property’ not legal tender.
This does not mean that bitcoin/cryptocurrency/virtual currency is illegal to use. It means that it is not considered coin and paper money declared by law to be good and sufficient for payment of public and private debts.
We suggest you contact a legal/tax representative and/or the IRS directly to receive your own clarification and determination on the subject of Tax Policy on the use of bitcoin/cryptocurrency/virtual currency. TARTLE assumes no liability for the public interpretation of this tentative note.
For more information on the IRS Tax Policy Notice 2014-21 and Department of the Treasury Financial Crimes Enforcement Network Guidance FIN-2013-G001, select the hyperlinks in the text.
A point of definition from Black’s Law Dictionary, we used these definitions of terms for perspective and understanding such legal notices:
- Goods – All tangible items
- Services – Duty or labor to be rendered by one person or another, the former being bound to submit his will to the direction and control of the latter
- Legal Tender – Coin and paper money declared by law to good and sufficient for payment of public and private debts
- Holding – General term for property, securities, etc. owned by a person or corporation
- Investment – An expenditure to acquire property or other assets in order to produce revenue
- Property – That which belongs exclusively to one; an aggregate of rights which are guaranteed and protected by the government; more specifically ‘ownership’
- Ownership – The unrestricted and exclusive right to a thing’ the right to exclude everyone else from interfering with it
Encryption + Data Security
Encryption is a subset of the field of cryptography. The idea of encryption is to encode information in a format that makes information unreadable if an unauthorized party chooses to intercept the information in transit.
For example a message might read, “Hello World!”, and before the information is transmitted to the authorized party it will be encrypted into an unintelligible block of information (a981247f2kha). Only the authorized receiving party and sending party have the key to ‘decrypt’ the ‘encrypted’ message. Therefore the information is theoretically safe even if intercepted by a devious party.
Encryption is important because it maintains the right to privacy everyone deserves of data at rest (data waiting to be used and sitting in storage), and data in transit (data moving from one authorized party to another through a connection medium). Making sure information is encrypted keeps sensitive private information private and valuable to the individual or entity which it belongs to. The benefit is obvious and quickly becoming a global standard for all information.
Employing encryption techniques to data and other information on the internet makes Bitcoin and TARTLE possible.
TARTLE uses SHA-256 for securing deployments and access to TARTLE’s secure servers. TLS v1.2 (Transport Layer Security) for SSL (Secure Sockets Layer) in HTTPS (Hypertext Transfer Protocol Secure) for transmitting data to clients accessing the application from browsers. Additionally we use Bcrypt for securely storing user credentials in the database. The TARTLE database is located on the same server instance as the marketplace application. Therefore, access to the database is not exposed to external world.
A Virtual Private Network (VPN) is a network connection system that allows internet users to send information from client to server across a public network in a private and, most times encrypted; secure manner. That way public channels for sending data can now have their own private “tunnels” to move data back and forth securely between the client and server.
There are various types of VPN services offered across the internet that have varying benefits and drawbacks. TARTLE through a partner program with NordVPN offer a secure, battle tested option to encrypt your internet traffic when not using the TARTLE Marketplace. You can sign up for this through the TARTLE Seller Web App on the Settings Page.
GDPR stands for General Data Protection Regulation. This was a proactive legal implementation in the European Union and enhancement of EU Data Protection Directive to employ policies that ensured best practices for protecting EU consumer (data subjects) personal data in-transit on the internet by an enterprise regardless of geographic residence of the enterprise.
This means that any system of an enterprise that controls and processes any form of personal data must implement appropriate technical and organizational measures to protect consumer data. Some of those measures are:
- Right of access by the data subject (TARTLE user can request all information on their account that is in use or not in use)
- Right to be forgotten (a system user can completely remove themselves at any moment from the TARTLE ecosystem completely)
- Transparency of information, communication, and modalities (TARTLE must take the appropriate measures to disclose how our system processes information)
These are just some of the regulatory specifics concerning GDPR. We encourage you to continue you research to understand your rights concerning this EU Legal Framework around data.
NIST is the National Institute of Standards and Technology. NIST is an agency that sets frameworks and guidelines in place for best practices in Security and Privacy Controls for Federal Information Systems and Organizations.
The framework developed by NIST (800-53 Rev. 4) for a National Vulnerability Database lays out the architecture, design, and workflow for data bases housing sensitive information on a national scale. Although these standards are not required for all businesses, they stand as the benchmark for corporate responsibility of databases in the United States.
The framework is broken down into 3 areas:
Each category of the framework for all intents and purposes offers the best practices are determined by the most sensitive government agencies in the United States, such as the Department of Homeland Security.
CCPA was a California legislative action that was passed in 2018 and set to take effect July 1st, 2020. it stands for the California Consumer Protection Act (CCPA). After the tech boom in Silicon Valley from the early 2000’s to now with successes of big data giants like Google, the state of California felt it needed to take a stand to promote digital rights for consumers within the state as the information the consumers were creating were creating tremendous value for these tech giants.
The CCPA was drafted and then enacted in 2018. The idea of consumer protection of digital rights, and what companies who process informaiton do with their information needed to be transparent to consumers. 4 new rights were granted to California consumers that mirror some of the standards of GDPR:
- The right to know what personal information is collected, used, shared or sold, both as to the categories and specific pieces of personal information;
- The right to delete personal information held by businesses and by extension, a business’s service provider
- The right to opt-out of sale of personal information. Consumers are able to direct a business that sells personal information to stop selling that information. Children under the age of 16 must provide opt-in consent, with a parent or guardian consenting for children under 13.
- The right to non-discrimination in terms of price or service when a consumer exercises a privacy right under CCPA.
Secondly, under the CCPA, businesses have to comply if they meet a certain criteria.
If you would like to find out more informatin regarding the CCPA and its application of principles, please click the link here to read the fact sheet.
In the mid 1990’s with onset of widespread internet adoption and computers. the healthcare system realized that a change from hard documents to soft digital documentation of health records could mean new risks for keeping patient data safe and private all while needed a standardized system to increase the efficiency of document portability. With this forward thinking worry, insurance companies and healthcare providers came together to create the Health Insurance Portability and Accountability Act in 1996 most commonly known as HIPAA.
After a final privacy ruling in late 2000 and a compounded security ruling in 2003, national standards were now set for health plans, health care clearinghouses, and health care providers who conduct the standard health care transactions electronically, and national standards for protecting the confidentiality, integrity, and availability of electronic protected health information.
Simply put, new precautions were taken that require medical business to make sure your patient information is secure and private at all times while trying to increase healthcare ecosystem efficiency.
If you would like to deep dive on the policy document for these combined rulings, you will find it here.
The principles here underneath began their non-binding undertaking in the 1980’s as a precursor to the European Union Data Protection Directive, which as we all know evolved into the EU legislation of GDPR.
This was one of the earlier attempts at creating a US-EU council of trade members who would follow these principles and hold themselves accountable as a group. Note the non-binding and self-governing aspect of this agreement. In the United States only businesses that fall under the Federal Trade Commission and Department of Transportation may participate in this voluntary program.
Although these policies are not required for all businesses in the US, especially businesses that handle large amounts of data and private consumer information, the principles stated below still show strong values and policy benchmarks which all proper businesses handling any data should follow.
Below you will find 7 principles. The first list is their summary of what they stand for and below that is the direct text taken from the ISH Document.
- Notice – Individuals must be informed that their data is being collected and how it will be used. The organization must provide information about how individuals can contact the organization with any inquiries or complaints.
- Choice – Individuals must have the option to opt out of the collection and forward transfer of the data to third parties.
- Onward Transfer – Transfers of data to third parties may only occur to other organizations that follow adequate data protection principles.
- Security – Reasonable efforts must be made to prevent loss of collected information.
- Data Integrity – Data must be relevant and reliable for the purpose it was collected.
- Access – Individuals must be able to access information held about them, and correct or delete it, if it is inaccurate.
- Enforcement – There must be effective means of enforcing these rules.
U.S. law will apply to questions of interpretation and compliance with the Safe Harbor Principles (including the Frequently Asked Questions) and relevant privacy policies by safe harbor organizations, except where organizations have committed to cooperate with European Data Protection Authorities. Unless otherwise stated, all provisions of the Safe Harbor Principles and Frequently asked Questions apply where they are relevant.
“Personal data” and “personal information” are data about an identified or identifiable individual that are within the scope of the Directive, received by a U.S. organization from the European Union, and recorded in any form.
An organization must inform individuals about the purposes for which it collects and uses information about them, how to contact the organization with any inquiries or complaints, the types of third parties to which it discloses the information, and the choices and means the organization offers individuals for limiting its use and disclosure. This notice must be provided in clear and conspicuous language when individuals are first asked to provide personal information to the organization or as soon thereafter as is practicable, but in any event before the organization uses such information for a purpose other than that for which it was originally collected or processed by the transferring organization or discloses it for the first time to a third party(1).
An organization must offer individuals the opportunity to choose (opt out) whether their personal information is (a) to be disclosed to a third party(2) or (b) to be used for a purpose that is incompatible with the purpose(s) for which it was originally collected or subsequently authorized by the individual. Individuals must be provided with clear and conspicuous, readily available, and affordable mechanisms to exercise choice.
For sensitive information (i.e. personal information specifying medical or health conditions, racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership or information specifying the sex life of the individual), they must be given affirmative or explicit (opt in) choice if the information is to be disclosed to a third party or used for a purpose other than those for which it was originally collected or subsequently authorized by the individual through the exercise of opt in choice. In any case, an organization should treat as sensitive any information received from a third party where the third party identifies and treats it as sensitive.
To disclose information to a third party, organizations must apply the Notice and Choice Principles. Where an organization wishes to transfer information to a third party that is acting as an agent, as described in the endnote, it may do so if it first either ascertains that the third party subscribes to the Principles or is subject to the Directive or another adequacy finding or enters into a written agreement with such third party requiring that the third party provide at least the same level of privacy protection as is required by the relevant Principles. If the organization complies with these requirements, it shall not be held responsible (unless the organization agrees otherwise) when a third party to which it transfers such information processes it in a way contrary to any restrictions or representations, unless the organization knew or should have known the third party would process it in such a contrary way and the organization has not taken reasonable steps to prevent or stop such processing.
Organizations creating, maintaining, using or disseminating personal information must take reasonable precautions to protect it from loss, misuse and unauthorized access, disclosure, alteration and destruction.
Consistent with the Principles, personal information must be relevant for the purposes for which it is to be used. An organization may not process personal information in a way that is incompatible with the purposes for which it has been collected or subsequently authorized by the individual. To the extent necessary for those purposes, an organization should take reasonable steps to ensure that data is reliable for its intended use, accurate, complete, and current.
Individuals must have access to personal information about them that an organization holds and be able to correct, amend, or delete that information where it is inaccurate, except where the burden or expense of providing access would be disproportionate to the risks to the individual’s privacy in the case in question, or where the rights of persons other than the individual would be violated.
Effective privacy protection must include mechanisms for assuring compliance with the Principles, recourse for individuals to whom the data relate affected by non-compliance with the Principles, and consequences for the organization when the Principles are not followed. At a minimum, such mechanisms must include (a) readily available and affordable independent recourse mechanisms by which each individual’s complaints and disputes are investigated and resolved by reference to the Principles and damages awarded where the applicable law or private sector initiatives so provide; (b) follow up procedures for verifying that the attestations and assertions businesses make about their privacy practices are true and that privacy practices have been implemented as presented; and (c) obligations to remedy problems arising out of failure to comply with the Principles by organizations announcing their adherence to them and consequences for such organizations. Sanctions must be sufficiently rigorous to ensure compliance by organizations.
(1) It is not necessary to provide notice or choice when disclosure is made to a third party that is acting as an agent to perform task(s) on behalf of and under the instructions of the organization. The Onward Transfer Principle, on the other hand, does apply to such disclosures.
(2) It is not necessary to provide notice or choice when disclosure is made to a third party that is acting as an agent to perform task(s) on behalf of and under the instructions of the organization. The Onward Transfer Principle, on the other hand, does apply to such disclosures.
TARTLE by law is required to meet and/or exceed these standards as a provider for marketplace activity that concerns the transmission and storage of data.
A few points of consideration are:
- Regarding HIPAA, when an individual gives their own medical info, the medical data does not fall under protected health information (PHI)
- Even though TARTLE is not required to follow all standard put forth, we see it as in everyone’s best interest to meet and exceed the standards and recommendations when possible.
TARTLE offers unprecedented creation, control, and financial empowerment to all parties on the TARTLE Marketplace.
Joining TARTLE allows individuals to stake the claim to their data, and shape the direction of our world as our information is the backbone of all the decision making for corporations globally. We as a connected global peoples are the sole determinants for our future, and joining TARTLE says that you are making the change in this world towards global financial empowerment, data sovereignty, and inclusiveness.
Data Sellers benefit from:
- Free access
- 100% data profit
- Full data wonership
- Digital wallet for banking services
- Data Credit Score (Tdex)
- Partner VPN Services
- World Class Encryption and Data Security
Data Buyers benefit from:
- Access to source data
- Bespoke data sets
- World class encryption and data security
- Data pricing Transparency
- Simple population studies
- One of a kind trading terminal
- Digital Wallet
Data Integrators benefit from:
- Increased customer value
- Increased marketing audience
- Possible profit sharing opportunities
- Seamless integration
What are you waiting for? Join today. For free. Forever.
Our future and how it is shaped is quickly being determined every second by the data this entire world creates. If data is the determinant for where we are headed, and we are the ones who create it, then TARTLE is important now as a tool for helping humanity define its path tomorrow and into the future.
Is financial empowerment, choice, data sovereignty, control, ownership, and inclusiveness important to you? Of course they are because half of these are basic human rights and highly moral/ethical values. We are the stewards to our future, and when you join TARTLE you increase the likelihood for improved global outcomes for us all and increase the value of everyone’s data collectively. When you win, we all win. Caring made easy.
Since ancient Babylon, data was hard coded onto ‘stocks’ to keep a measure of ownership for certain assets in Ancient Mesopotamia. Data at that time determined the economy of one of the most developed cultures on record. Since, then to modern day; how we account data from the physical (tangible) to the non-physical (computational data) has only grown in importance, efficiency, portability, and relative understanding of its importance.
Data has show patterns in the darkness, discovered galaxies, cured diseases, evolved financial markets, fostered tech giants, and now come full circle to be in your control. Educating ourselves on the power of data and what can be achieved with it, especially consciously and collectively will bring even grater prosperity, health, and understanding to the world and universe we live in.