Products

Data Rooms

Virtual data rooms with policy-bound documents that survive the transaction.

Data Rooms are the collaboration surface for multi-party, multi-document work — M&A diligence, regulatory examinations, litigation holds, coalition operations, research consortia. Every document in a Data Room is ZTDF-wrapped, and the policy governing access travels with the document even after it leaves the platform.

What distinguishes a Data Room

Conventional virtual data rooms protect documents while the deal is live. The platform logs who viewed what, enforces download restrictions, and can revoke viewing rights. When the deal closes or collapses, the platform's enforcement ends. A screenshotted page or a downloaded copy is outside the platform's control.

A Lattix Data Room protects each document at the document level. A policy denial at any time — including after the deal ends — prevents further unwraps, regardless of where copies of the envelope have traveled. The platform's active enforcement is no longer the last line of defense; the document's own envelope is.

Room structure

A Data Room is a tenant-scoped collection with its own configuration:

  • Members — the principals and groups authorized to participate, with a per-member scope (viewer, contributor, administrator).
  • Documents — files uploaded into the room, each wrapped as a ZTDF object and classified per the tenant's tag schema.
  • Folders and sections — organizational structure within the room.
  • Templates — starter structures for common room types (e.g. a diligence room template that pre-creates folders for financial, legal, technical, and HR sections).
  • Policies — which members can see which sections under which conditions.
  • External invites — one-off access for counterparties who are not tenant members.

External invites

A counterparty participating in a Data Room does not need to be a Lattix tenant. They receive an invite bound to a verified identity (email, or a federated identity if they have one), and their access is authenticated on every entry.

From the tenant's perspective, the counterparty is a scoped principal that policies can reference like any other. From the counterparty's perspective, they see only the portions of the room authorized by the governing policy — other folders, sections, or documents are invisible.

Audit and evidence export

Rooms are designed around the evidence question: who did what, when, and under what authority.

  • Every document view, download, search, and policy change produces a ledger record.
  • A room administrator can export an audit pack for the room — a signed bundle of the full event stream plus the governing policies at each point in time — suitable for regulatory submission or discovery production.
  • Room state at a given point in time can be reconstructed from the ledger, supporting post-close disputes or regulatory inquiries.

After the room closes

When a transaction ends or a room is archived, several options are available:

  • Archive — the room is retained but new access is disabled. Historical evidence remains queryable.
  • Revoke — policies are updated to deny all access. Envelopes in the wild can no longer be unwrapped.
  • Purge — after any legally required retention period, the tenant can purge the room's documents and anchor the purge itself on the ledger.

Which option is appropriate depends on legal, regulatory, and commercial requirements that vary by jurisdiction and industry.

Relationship to concepts