“Reengineering” for Sustainable Data Sharing Protection and Monetization
“Business Reengineering” was one of the biggest business fads of the 1990’s, but at its heart was Michael Hammer’s and James Champy’s core message that incremental improvement doesn’t work and that companies instead need to “fundamentally rethink and redesign” their business processes.* Nowhere in business is this principle more needed than in protecting and monetizing personal and sensitive data, and in eliminating data usage risk.
For the last two decades data protection has been a matter of incremental improvement: adding more layers of traditional technologies – access control, encryption, obfuscation – with the occasional niche technology like differential privacy for a select set of purposes. The net result is somewhat safer data, but the time has come to rethink, really to reengineer, how data is shared to and used by processing partners whether within data provider’s organization or outside. The goal needs to be to eliminate data risk, not just slice it down a bit every now and then with diminishing returns to each iteration.
Is there a new approach fit reengineer data sharing to eliminate usage risk? Yes. Confidential compute technologies for “data in use” protection, and especially secure enclaves, provide the means for data and algorithms to come together in open text, with none of the value-sucking drawbacks of obfuscation or encryption or computational limitations of the “high math” technologies. Another technology, digital contracts, provides the means for legal contract terms to become enforceable code and for the characteristics of the processing – data, the processing environment, and the algorithm itself! – to themselves become a real-time contract surveilling for and stopping for any anomaly.
Put them together, and you have the “smart” cleanroom for data and analytics partners to carry out any analytic (i.e., unlimited “programmability”) without any ability for either partner to see the other’s IP. Even more important, only the agreed upon processing can take place, ensuring that the data provider’s data and its value are both protected completely.
Helios Data’s Secure Data Sharing platform is that smart cleanroom, providing data-contract-governed confidential computation for data protection that is quick to deploy (whether on-premises, on the Cloud, or hybrid), easy to use for business people and data scientists alike, and enables companies to liberate and monetize their data assets while eliminating data usage risk. To learn more, click here!
*Reengineering the Corporation, 1993.
Tags: Data Privacy, Data Monetization, data controller, data subject, GDPR, Data risk, Secure Data Sharing, data protection, digital contract, secure enclave, Data Usage Risk