Data Owners: Empowering Data Exchange and Ownership

Data Owners in the Small Data Network retain control and ownership over their valuable data while enabling secure and controlled sharing. They safeguard their data within local data centres, preserving privacy and security. By defining Data Interoperation Protocols, Data Owners ensure responsible and controlled access to their data, empowering data exchange while safeguarding their ownership rights.

Collecting and Preparing Data Sources: Data Owners begin by preparing and securely storing their data within their local data centre. This process ensures they retain full ownership and control over their valuable information. Data can encompass various types, such as customer profiles, sensor data, research findings, or any other helpful dataset. In the Small Data Network context, it's essential to acknowledge that data collection can often be passive, with data traces generated by individuals or companies automatically recorded and securely stored. This passive data collection process reflects the evolving nature of data acquisition, where various sources continuously generate data without active intervention.

By securely storing their data within their local data centre, Data Owners maintain an unwavering commitment to retaining full ownership and control over their invaluable information, whether actively curated datasets or passively collected data traces. This sense of ownership and control is pivotal in the Small Data Network paradigm, as it empowers Data Owners to decide how their data is accessed, under what conditions, and by whom. The secure environment of the local data centre becomes a fortress of protection, ensuring that the integrity, confidentiality, and availability of their data are upheld. This foundational step underscores the network's commitment to data privacy and security, setting the stage for responsible and privacy-conscious data sharing within the Small Data Network.

Defining Data Interoperation Protocols: Data Owners define Data Interoperation Protocols in the Small Data Network. These protocols outline how their data should be accessed and processed under specific conditions. Importantly, these protocols are meticulously crafted to align with the Data Owners’ privacy and security preferences, ensuring that data usage remains responsible and respectful of the Data Owners' interests.

These protocols are designed to offer a structured and precise framework for data sharing within the network. They address various aspects of data interaction, including access controls, permissible use cases, data expiration, and any fees associated with data access. The primary objectives of these protocols are:

  1. Privacy Protection: Data Owners can specify stringent privacy requirements within their protocols, ensuring that sensitive information is handled carefully. For example, a financial institution may mandate strict encryption standards for financial transaction data to prevent unauthorised access.

  2. Data Security: Security measures are an integral part of these protocols. Data Owners can define robust security measures tailored to the specific nature of their data. These measures could include multi-factor authentication, access logs, and data integrity checks.

  3. Responsible Usage: The protocols emphasise responsible data usage, addressing concerns related to ethical considerations, permissible use cases, and data sharing for societal benefits. For instance, a research institution may specify that its data can only be used for non-profit scientific research.

  4. Access Controls: Data Owners have granular control over who can access their data and under what circumstances. Access controls can be based on criteria such as user identity, purpose of access, and data expiration.

  5. Securitisation Model: Importantly, these protocols also include details on how data access fees or charges are structured. Data Owners can define pricing models that align with the value and utility of their data. This pay-as-you-go approach allows data owners to securitise their data while retaining ownership.

Data Owners can also download and deploy third-party protocol applications within their local data centres. These applications act as intermediaries, facilitating the pre-processing and controlled data exposure to the network while adhering to specific protocol guidelines. This flexible approach adds versatility to the network, allowing Data Owners to leverage third-party solutions that align with their unique data-sharing requirements, further fostering innovation and collaboration within the network ecosystem.

Last updated