4 Ways Organizations Can Think About Data Sharing

4 Ways Organizations Can Think About Data Sharing

Four anonymized client success stories to inspire you!

Here are four micro-stories showcasing how our clients are safely and effectively unlocking value from structured and unstructured data.

We hope they help you see new ways to unleash the full potential of sensitive data in your care while respecting and protecting privacy. Please reach out if you have questions or want a Privacy Analytics data expert’s perspective on your business need.

Internal to external data sharing

A utility system operator wanted to translate advances in internal data sharing, which had set the stage for organizational success, into a move to external data sharing.

When they came to us, they needed to work through privacy concerns and legal hurdles, reputational risks, the need for a significant cultural shift, and confidentiality.

Following market research to shape messaging for a risk-sensitive public, we recommended starting with smaller attempts at data sharing, such as 3rd party access to internal systems, trusted data enclaves at a 3rd party site, collaborative exchanges, or transparency initiatives.

By leveraging existing tools, they were able to extend their data-sharing culture from internal to external.

External to internal data sharing

A pharmaceutical corporation sought to capitalize on advances in external data sharing, forcing an organizational shift in culture and views around internal sharing of data.

In order to make this transition, they needed to define their purpose for internal data sharing and formalize their internal transparency policies regarding access and controls.

With Privacy Analytics’ guidance, they were able to leverage existing systems and frameworks for external release to create systems that are predictable, manageable, and disassociated from people, for the purpose of protecting data.

Want the tool our experts use to plan, review, and launch data strategies?

Download the Data Strategy Canvas.

Sign me up for marketing communications on safely leveraging sensitive data

We may contact you in the future about related resources. You can unsubscribe at any time. For more information, see our privacy policy

Defensive to offensive data sharing

A telecommunications conglomerate needed a starting point to move from a defensive posture toward data sharing but found it hard to overcome cultural conservativeness.

Fortunately, well-established defensive strategies can be a great starting point for deriving value from data because the rules of engagement are established. This helps build trust when moving towards greater engagement with data.

With Privacy Analytics’ help, they could leverage their existing governance structure and tech to find small wins while simultaneously building momentum and capacity.

Offensive to defensive data sharing

An on-demand service needed to build out their defensive capabilities and manage a cultural shift in order to modify their offensive posture towards data sharing. While they were leveraging their data, they were aware that compliance and reputational risks might become threats.

When making cultural shifts, it’s important to champion existing business functions while providing more clarity and direction on how to change. In consultation with Privacy Analytics, they were able to adapt their offensive data sharing strategies to increasingly incorporate defensive capabilities.

We helped by providing vision and strategies to bring in governance and trustworthy data enablement.

Unleash data value and prove regulatory compliance

Privacy Analytics’ proven technology and expertise empowers you to enable timely, usable data that can be safely linked and put to work – in compliance with global regulations – and backed by auditable proof.

To find out how Privacy Analytics can help you, reach out here.

Archiving / Destroying

Are you unleashing the full value of data you retain?

Your Challenges

Do you need help...


Value Retention

Client Success

Client: Comcast

Situation: California’s Consumer Privacy Act inspired Comcast to evolve the way in which they protect the privacy of customers who consent to share personal information with them.


Are you achieving intended outcomes from data?

Your Challenge

Do you need help...


Unbiased Results

Client Success

Client: Integrate.ai

Situation: Integrate.ai’s AI-powered tech helps clients improve their online experience by sharing signals about website visitor intent. They wanted to ensure privacy remained fully protected within the machine learning / AI context that produces these signals.


Do the right people have the right data?

Your Challenges

Do you need help...


Usable and Reusable Data

Client Success

Client: Novartis

Situation: Novartis’ digital transformation in drug R&D drives their need to maximize value from vast stores of clinical study data for critical internal research enabled by their data42 platform.



Are you empowering people to safely leverage trusted data?

Your Challenges

Do you need help...


Security / compliance efficiency


Client: ASCO’s CancerLinQ

Situation: CancerLinQ™, a subsidiary of American Society of Clinical Oncology, is a rapid learning healthcare system that helps oncologists aggregate and analyze data on cancer patients to improve care. To achieve this goal, they must de-identify patient data provided by subscribing practices across the U.S.


Acquiring / Collecting

Are you acquiring the right data? Do you have appropriate consent?

Your Challenge

Do you need help...


Consent / Contracting strategy

Client Success

Client: IQVIA

Situation: Needed to ensure the primary market research process was fully compliant with internal policies and regulations such as GDPR. 



Are You Effectively Planning for Success?

Your Challenges

Do you need help...


Build privacy in by design

Client Success

Client: Nuance

Situation: Needed to enable AI-driven product innovation with a defensible governance program for the safe and responsible use
of voice-to-text data under Shrems II.


Join the next 5 Safes Data Privacy webinar

This course runs on the 2nd Wednesday of every month, at 11 a.m. ET (45 mins). Click the button to register and select the date that works best for you.