top of page
Our Case Studies
Consumers care about their data privacy. Due to the lack of trust and transparency, many organizations suffer from a low percentage of consumers accepting universal consent to share personal data. To gain more consumer insights, organizations partner with market research firms to collect 3rd party information anonymously, which is not only costly, but also time consuming and much less accurate than zero and first-party data. 

An international retail bank wants to enhance and improve their service offerings by providing a NextGen consent and sovereignty experience for their customers. With our Consent Broker solution, the bank is able to: 

  • Maintain and improve brand trust and recognition with consumers 

  • Establish a symbiotic data sharing and trusted environment with their customers and partners 

  • Save $10 per consumer on data collection while gaining accurate zero-party insights in real time 

  • Increase their own ethical and ESG profiles as a result of providing transparency, governance, and consent to customers 

  • Be proactively compliant with privacy regulations by having consumer data fully protected 

Screen Shot 2022-02-14 at 5.20.42 PM.png
Case Study 5 - Retail. CRO – Peer to Peer Data Monetization​.jpg

Financial Services is a highly regulated industry. Almost all international scale organizations have massive data silos which makes it extremely challenging to manage, protect, and analyze data holistically while keeping compliant under different regimes.

A multinational investment management corporation underwrites deals and manages hundreds of billions of dollars in investment accounts for their customers around the globe. Researchers are bound by "Chinese wall" protocols for access, use, and sharing data internally and with their clients. With our Privacy Preservation solution: 

  • The corporation establishes a data catalog with virtually consolidated data from different infrastructures and formats, saving millions of dollars in data lake migration 

  • Analysts securely access their authorized data seamlessly from the virtual data catalog without the risk of violation of protocol 

  • Analysts perform research on encrypted data without the need to see any sensitive information 

  • Time sensitive documents "self-destruct" strengthening client retention and trust 


Drug discovery is a multi-year process costing an average of $2.5 billion over an average period of ten years. Pharmaceutical companies perform high frequency genetic sequencing to identify cures. To conduct such analysis, organizations need to collect highly sensitive samples from patients with their consent as well as additional voluntary data that is not part of the clinical trial.  

A top global precision medicine company puts their patients at the center of data privacy. With our Consent Broker solution: 

  • Patients willingly share their data knowing that it’s secure and is only used for R&D purposes 

  • Patients benefit from drug development as a result of their participation in the trusted program 

  • The company partners with pharmaceutical companies by providing them with quality, firsthand encrypted patient data 

  • R&D teams are performing analysis on the virtually consolidated data without "seeing" sensitive patient information 

  • The company has a centralized way to view all patients' consents and is proactively compliant with privacy regulations by having data fully protected 

Screenshot 2023-01-11 at 3.35.31 PM.png
Case Study 2 - Healthcare – CTO - Customer Insights Marketplace.png

Law firms hold a large number of unstructured data, including, but not limited to, legal documents, compensation files, financials, income statements, contracts etc. Strict document sharing and retention is bound by contracts and laws but not systematically guaranteed.  

With our Privacy Preservation solution, an international law firm prevents document exfiltration by wrapping documents with embedded sharing policies: 

  • All document consumption activities are tracked 

  • Time sensitive documents "self-destruct" at the end of the retention period 

  • The firm shares documents securely, significantly reducing liability risk 

bottom of page