Privacy Consent
 

CASE STUDY 1

International Retail Bank Gains Trust and Insights
The Challenge

Client wants to enhance and improve their service offerings by providing a NextGen consent and sovereignty experience for their customers.

 

Establishing a symbiotic data sharing and trust environment while maintaining and increasing brand trust and recognition is extremely challenging and costly.

Results
  • Client is able to provide "Data Trust" to their customers 

 

  • Client's ethical and ESG profile increases as a result of providing transparency, governance, and consent to customers

 

  • Client gains zero-party consumer insights while maintaining granular consent and privacy

 

  • Client saves $10 per consumer on data collection

Case Study 1 - CDO_COO Customer Trust _ Insights.png

CASE STUDY 2

Diagnostic Company Involves Patients as Part of its Clinical Trials for Better Drug Discovery 
The Challenge

Drug discovery is a multi-year process costing an average of $2.5 billion over an average period of ten years. Pharmaceutical companies perform high frequency genetic sequencing to identify cures. To conduct such analysis, client needs to collect highly sensitive samples from patients with their consent as well as additional voluntary data that is not part of the clinical trial. 

Case Study 2 - Healthcare – CTO - Customer Insights Marketplace.png
  • Client puts their patients at the center of data privacy and trust. Patients willingly share their data knowing (Visually) that it's secure and only used for R&D purposes

 

  • Patient can interactively share data and benefit drug development for mankind from their participation in the trusted program  

 

  • Client can partner with pharmaceutical companies by providing them with quality, firsthand encrypted patient data

 

  • R&D teams are performing analysis on the encrypted data without "seeing" the sensitive patients' information

Results

CASE STUDY 3

Multinational Conglomerate Improves Consolidated Brand Trust with Granular Consent and Protection
The Challenge

Consumers care about their data privacy. Due to lack of trust and transparency, Clients suffer from the low percentage of consumers accepting universal consent to share personal data. To gain more consumer insights, Client partners with market research firms to collect 3rd party information anonymously, which is not only costly, but also slow and much less accurate than zero- and first-party data.

Results
  • Client is able to gain trust by providing transparency to consumers and show the exact data points Client uses the collected data points and is able to provide consumers better products and services.​

  • Client requests  granular consent directly from consumers, gaining access to accurate information in real time. In return, consumers are incentivized to share more data.​

  • Client is proactively compliant with privacy regulations and consumer data is fully protected.

Screen Shot 2022-02-14 at 5.20.42 PM.png

CASE STUDY 4

Health Insurance Provider Centralizes Members Consent and Controls Data Distribution
The Challenge

Client doesn't have a centralized way to manage members' consent. The lack of consent history and traceability causes trust issues. In one case, when a member consents to be contacted only via email, this information is not communicated to other departments and unwanted material continues to be delivered to them by the post office. Client needs to solve this issue to improve credibility and gain trust.

  • Client gains direct access to granular and timed consent from members in real time. ​

  • Client has a centralized way to view all members' consent. In addition, based on the consent activities, client is able to gain more insights and therefore provide better products and services.​

  • Client is proactively compliant with privacy regulations and consumer data is fully protected.

Results
Screen Shot 2022-02-14 at 5.19.27 PM.png
Privacy Preservation

CASE STUDY 1

Health Insurance Provider Enforces Data Rights Policies Across All Subsidiaries
The Challenge

Client is a parent company and owns many subsidiaries, some of which do business with competitors. Client also hires a 3rd party company to conduct fraud checks on claims. All of these require certain data to be consolidated and restricted during distribution. At the moment, data is either replicated with localized access controls or not shared at all. Client is not able to gain a holistic view on the organization's overall data usage.

Results
  • Client virtually consolidates data from different entities without the need to maintain replicated copies, saving millions of dollars in costs while securely protecting data​

  • Sensitive data remains encrypted at rest and in-transit. Data recipients analyze encrypted data without having to "see" the actual values

CASE STUDY 2

Global Law Firm Protects Time Sensitive Documents and Prevents Data Exfiltration
The Challenge

Client holds a large number of unstructured data, including but not limited to legal documents, compensation files, financials, income statements, contracts etc. Client needs to prevent document exfiltration regardless how and where it’s sent to.

  • Traditional data room, access control and DLP solutions don’t prevent documents from being shared or photographed once it leaves the “green room”

  • Furthermore, there's no guarantee that a document is deleted after a promised retention date.

Screen Shot 2022-02-10 at 1.23.15 PM.png
Document Exfiltration.png
Results

​All client’s documents are wrapped with One Creation’s embedded privacy envelope. Clients sends documents anywhere with a piece of mind:

  • Only authorized recipients can open them. All actions are tracked.

  • Time sensitive documents will “self destruct” after the retention period.

  • Client now has flexibility in collaborating with sensitive data

  • Client’s liability risks is significantly reduced

 
Roadmap & Clients - Generic.jpg

CASE STUDY 3

Exchange Sells and Protects Market Data
The Challenge

Client sells their unique and proprietary market data on their website. They have only been able to enforce data usage via legal purchase agreements. There is no systematic way to track and prevent data from being re-distributed.

Case Study 5 - Retail. CRO – Peer to Peer Data Monetization​.jpg
Results
  • Client's market data is wrapped inside OC's secure envelope, preventing unauthorized redistribution and misuse, thus optimizing millions of dollars in revenue

 

  • Client centralized their data virtually in OC's data policy catalog without the need to consolidate data and integrate with a data marketplace

CASE STUDY 4

Supervisory Team Protects Sensitive Information
The Challenge

The Federal Reserve Board (FRB) and New York Department of Financial Services (NYDFS) implemented regulations to protect the sharing of confidential supervisory information (“CSI”). The NYDFS requires regulated entities to receive prior written approval from NYDFS each time they want to share CSI with service providers. 

 

Client stores CSI content in various forms and infrastructures. The challenge is to make sure the CSI is securely protected and not shared with unauthorized data consumers. 

Results
  • Client is fully complying with regulations without having to worry about potential violations

 

  • Client is able to provide regulators a full lineage and transparency report

Case Study 6 - Finance – Head of Reg Relations – On Prem.png
Case Study 7 – Finance – Group CEO – On Prem1.png

CASE STUDY 5

Regulated Entity Governs Cross-Jurisdiction Fragmented Data
Case Study 7 – Finance – Group CEO – On Prem1.png
Case Study 7 – Finance – Group CEO – On Prem2.png
The Challenge

Global Over the Counter trades are reported to their respective jurisdictions without harmonization. Regulators cannot access all trades and are unable to perform global systematic risk management. 

 

The traditional solution of data aggregation would require migrating and aggregating data physically into a single data lake which is not only technically challenging and expensive, but also legally prevented by local regulations. In addition, data should only be accessed during a certain period of time and there is no guarantee of its “deletion”. 

Results
  • Client virtually consolidated data from different entities, infrastructures, and formats, without data lake migration

 

  • Client can now “self destruct” time sensitive data after the pre-defined expiration date

CASE STUDY 6

Multinational Corporation Controls and Analyses Sensitive HR Data
The Challenge

Client needed to bring HR data, PnL, budgeting information together in order to perform assessment on company’s risks and controls. HR department could not release sensitive data, therefore, had to pull required information into separate reports and protect it with DLP, which required manual approval from managers in order to release the limited data. This process was labor intense and extremely time consuming.

Results
  • HR releases homomorphically encrypted data for risk assessment in real time
     

  • Client gains more accurate insights with enough data while keeping data confidential and securely protected

Screen Shot 2022-02-03 at 3.13.48 PM.png

CASE STUDY 7

Investment Researchers Bring Siloed Data Together to Make Better Investment Decisions
The Challenge

Client underwrites deals and manages hundred billion dollars of investment accounts for their customers around the globe. For each customer, private and public market research analysts have to duplicate data and conduct researches independently without the ability to share information due to “Chinese wall” protocols. As a result, same customer data is maintained at different places.

Case Study 8 – Asset Management – CTO - API1.png
Results
  • Each equity analyst can request and access their authorized customer data directly from the siloed data collection points

 

  • Analysts perform analysis on encrypted data without the need to see any sensitive information

 

  • Client no longer need to maintain duplicated data, saves millions of dollars in costs while securely protecting customer data

Case Study 8 – Asset Management – CTO - API2.png