digitalAudience DCR principles
Our data clean room solution is built to meet and exceed the principles outlined in the IAB guidelines, ensuring secure, privacy-first collaboration between data partners. By combining advanced privacy-enhancing technologies with strict access controls and query limitations, we enable participants to gain actionable insights without exposing raw or identifiable data. This document highlights how our implementation not only adheres to industry standards but also introduces additional safeguards and flexibility for modern data collaboration.
IAB Recommendation
What DCR principles our data collaboration solution already offers
Data Isolation
Raw or plaintext data cannot be observed or learned by any participant or DCR Provider unless the participants agree.
Data contributors cannot observe or learn any raw or plaintext data because the data is hashed in the browser before it lands in the data storage if the client has not hashed it themselves beforehand.
Moreover, when collaborating with other data partners, data contributors have only pre-defined capabilities. It is not possible to query the other participant’s data. A participant can only view the overlap analysis results.
Privacy Enhancing Technologies (PETs)
To minimize data movement, risk of exposure of personal data, and misuse of data for re-identification of individuals, a DCR must deploy a combination of one of more PETs.
We use a combination of encryption and private set intersection to allow data providers to view a rough estimate of a resulting intersection.
Encryption
Secure multi-party compute
Private set intersection
Federated learning
Synthetic data
Pseudonymization
Noise injection
Differential privacy
K-anonymity
Privacy control mechanisms:
Limiting the number of queries allowed
Limiting the time for which access to compute operations are allowed, expiring the data access after a certain time window
Limiting the type or complexity of queries that can be executed
Restricting reuse of one data set with other participants
Requiring rebuild of input data sets for each operation
Apply statistical noise on query results
Limit the outputs or granularity to only those necessary insights that are required for the task
In technical terms, we limit the number of queries that can be executed and limit the granularity to the necessary insights required for the task. Practically speaking, our users can perform only a few queries:
View the results of the private set intersection.
View the match key for the private set intersection.
There is a list of preset queries that can be applied on the data sets. It is not possible to modify the queries by the users.
Each collaboration executes a full recalculation of the overlap function, injecting noise to increase the ambiguity of the result set.
Limit the data involvement to the necessary parts selectively.
Access Controls
DCRs provide permissions and scoped access controls to define, monitor, and control who can perform what specific action, for what purpose, at what granularity, for how long.
We provide access only to the permitted audiences for collaboration.
Moreover, we let our clients decide who can collaborate with their audiences and for how long.
Data Connection
DCR must provide a secure way for Data Contributors to connect their data to the DCR and define the format and structure for e.g. data types, data fields to ensure Data contributors can properly send data to DCR.
We support both client’s SFTP and S3 buckets as well as provide the clients with access to their designated S3 within our system.
In addition, we provide clear guidelines on how they should format and structure out data.
Data Transformation
Data collaboration may require assembling the data in a form and shape that is ready for joining with other data sets and querying.
We make the participant’s data interoperable by converting it into the identifiers that are required by the recipient system.
Data Processing
DCRs may provide two types of processing modes - centralized and federated.
We process all data in centralized mode post-encryption for matching. The real values are extracted within the DCRs, after the matching step, not available in the central processing environment.
Data Preparation and Protection
DCR provides the capability to protect and secure the personal data by converting them to irreversible anonymized values. This can be done inside the DCR env if you fully trust the provider of the env, or prior to submitting data to the DCR based upon agreed technologies and mechanisms. Some common mechanisms are:
Salted hash
Encryption
Commutative Encryption
We encourage data participants to encrypt their data prior to onboarding, applying the SHA256 algorithm.
DCR Environment and Interface
We offer a user interface where users with limited or no technical knowledge can safely onboard, collaborate, and activate their data sets.
The activities that can be performed with UI, are also available in API mode, enabling server to server operations.
Data Computation
To enable collaboration between parties, a DCR may offer different join types and matching types.
There are two Join types:
Party-to-party-join
Multi-party join
Common Matching types are:
Intersection
Union
Exclusion
Other data processing capabilities:
Once the join and matching is completed, DCR may offer advanced compute and querying capabilities, for example generate insights and outcomes based on predictive ML models.
The DCR Provider should be transparent about features used for data modelling, .e.g., LAL segments so that the DCR consumer is aware of attributes used in models and they can remain compliant under laws.
We offer two types of joins:
Party-to-party-join
Multi-party join
The support the intersection, union and exclusion matching type.
Data Output
The data outputs may be aggregate or at the individual user level.
Aggregate outputs
Insights
Customer overlap analysis
Consumer segmentation
LAL modelling
Audience expansion
Measurement
Frequency/lift analysis
Reach and frequency
Audience verification
Attribution
User level output (media activation/serving)
Direct activation
Emerging media, CTV, streaming, audio, gaming, and retail media
walled gardens
Indirect or open activation
Private marketplaces and direct premium digital publishers
Longtail media inventory over open bidding programmatic channels through integrated partners
We provide
Aggregate outputs
Customer overlap analysis
LAL modelling
Audience expansion through digitalAudience data
We enable activation into walled gardens, private marketplaces, and direct premium digital publishers.
Last updated