security

Fun Fact About Clean Rooms: Data Security Isn’t A Given – AdExchanger


data clean rooms (hero size)

Data clean rooms are magic. All you have to do is put your data inside, press a button, and it comes out matched, privacy safe and secure on the other side.

Just kidding.

Advertisers need to do their due diligence on potential clean room partners before working together, including (and especially) finding out how secure the platform is.

Because once data has been exposed, linked or enriched by another data set, “you can’t walk that back,” said Devon DeBlasio, VP of product marketing at InfoSum, speaking at an IAB Tech Lab Rearc privacy event in New York City last week.

Toothpaste doesn’t go back in the tube.

Somebody call security

Some of the potential security threats in a data clean room environment are the commingling of data, information leakage and “publisher ad observation.”

If, for example, a publisher knows which ads an advertiser is planning to serve, it could observe and log the first-party IDs associated with its own visitors who were also shown the ads. Then the publisher could look up the plaintext PII match keys for those identifiers and – voila! – the data has been exposed.

But not all threats are nefariously motivated, said Bosko Milekic, chief product officer at data collaboration platform Optable.

For example, say a media company owns and operates its own SSP or an advertiser has its own DSP. There’s nothing wrong with that, Milekic said, but even seemingly benign internal data sharing between them can be a form of “collusion” that leads to privacy and security problems, including data transfer through unsecured channels.

Readers Also Like:  Your biggest barriers to digital transformation aren’t technical…they’re cultural - CIO

In order for data clean rooms to be considered secure, according to the IAB Tech Lab’s new technical standard for data clean room interoperability (which was released for public comment last week), the rooms have to check three important boxes.

  1. All PII must be encrypted and never shared directly with any party.
  2. No participant should be able to learn anything about the identity of people who aren’t in their own contributed data set.
  3. No one involved should be able to learn anything about anyone in the overlapping audience.

Miss any of these steps, and a clean room can’t really call itself a clean room.

Always ask

But the devil is in those details, and there are a lot of other things for advertisers to consider before partnering with a data clean room.

For example (deep breath):

How does the clean room access data? Can the data stay put, or will it have to be streamed into another platform? Do you have to change the format of your data before sharing it? Are there controls for data governance and encryption? How granular are the controls? Is there a time limit for how long the clean room has access to the data? Will the data flows be audited? What queries can you run on the platform, and is there a specific query language? What type of liability do you have in case of a data breach, and whose responsibility is it? What happens if there’s a breach involving matched data?

“This gets very complicated,” DeBlasio said, “but these are very important questions to ask.”

Readers Also Like:  Business Reporter: Maximising data security and minimising latency ... - tech.einnews.com

And we’re not done.

Don’t forget to ask about which privacy-enhancing technologies (PETs) the data clean room uses, said Rachel Blum, principal architect and field CTO at Snowflake.

Some PETs are more privacy-enhancing than others, depending on the use case and the advertiser’s own risk tolerance. And PETs aren’t static. The “level” of privacy can be dialed up or down based on qualitative thresholds, and there’s usually a trade-off between privacy and accuracy.

A data breach is a headache no one wants, but implementing a PET that’s so strong you can’t do anything practical is also a problem.

“It’s important to consider what you’re interested in implementing and what risks you’re looking at,” Blum said. “You also need to be able to actually perform the activity.”



READ SOURCE

This website uses cookies. By continuing to use this site, you accept our use of cookies.