top of page
  • Writer's pictureNancy Langdon

The right information. In the right form. At the right time. For the right reason. Only.

Updated: Mar 21




Welcome to the Dataspace Library, where gaining entry is as simple as having your very own library card. Imagine this card as your ticket to a world of insights. Now, in the same way, you'd need a library card to access specific sections of a traditional library, your digital library card allows you entry into carefully curated data spaces. This library card isn't just a pass; it's a personalized key. It holds the information about what you can access, ensuring that you only enter the sections relevant to your needs. Think of it as a tailored experience, where you get precisely what you need without having to browse through endless shelves. 

​

In this library, think of the librarian as a savvy data manager. She oversees a reading room where various parties come together to exchange insights without revealing their secret recipes.

​

Just like in your town’s library, this library has different sections to house specific categories–like books are grouped by genres and subject matter. So, of what use is this special dataspace library? Well, dataspaces hold the power to make real strides in, for example, reducing carbon emissions and preventing infectious disease while protecting trade secrets and a patient’s privacy. Let’s take the example of carbon footprints, heretofore a theoretical sum of greenhouse gas emissions caused by an individual, event, organization or product, calculated by adding up the emissions from every stage of a product or service's life.

The carbon footprint includes material production, manufacturing, use, and end-of-life. Let’s take the example of automobiles: Cars, clearly, are complex products composed of tens of thousands of pieces made by thousands of suppliers. Now, picture automobile manufacturers as enthusiastic readers who want to understand and compare their carbon footprints. However, these manufacturers guard their unique manufacturing, material and supplier strategies, much like authors safeguard their writing techniques.

​

Here's where our dataspace librarian works her magic: This librarian, or data manager, facilitates a controlled reading room where our auto manufacturers can access the information they need without exposing proprietary details. It's like sharing a book's essence without revealing the plot twists.

​

For instance, Manufacturer A might want to understand the sourcing of a certain ABS plastic used in Manufacturer B’s dashboards to establish its carbon footprint. The librarian, adept at managing permissions, allows access to that relevant section, ensuring that Manufacturer A gains insights about the ABS plastic without seeing the classified chapters that reveal the secret sauce.

​

At the same time, Manufacturer B, with a focus on alternative energy sources, accesses pertinent data from Manufacturer A in a secure manner. The librarian orchestrates this data sharing (and not-sharing) dance, ensuring that both parties leave the reading room with the knowledge they sought, all while preserving the mystery around their distinct approaches.

​

In this scenario, the dataspace functions as a collaborative hub, fostering an environment where competitors can collectively work towards a greener future without compromising their individual recipes for success. It's a shared space, delicately managed by the librarian, ensuring that while knowledge flows freely, trade secrets remain securely shelved.

​

Now, let's delve into why these data spaces are best managed by neutral third parties, akin to our trustworthy librarian. Picture the librarian as a guardian of knowledge, ensuring fair play in the reading room. Similarly, a neutral third party in the digital realm guarantees unbiased management, control, and administration of the data space.

​

Consider the concept of data sovereignty – the idea that data is subject to the laws of the country in which it is located. Entrusting a neutral third party with this responsibility ensures a level playing field for all participants. It prevents any single entity from wielding undue influence, thus stewarding an environment of trust and collaboration for the benefit of all.

​

So, who is our "librarian"? In this analogy, you may be inclined to think that our librarian-cum-data manager has a little too much power, seeing as she is the one who determines who sees what, when, how and for how long. Except she isn't "one"- she isn't one organization, one person or even one service. She is a collective: She is all the members at once. And so how is that supposed to work? If every member of the data space, every "library card holder" is also the librarian, how is the integrity of the data space and its intended function maintained? What prevents any single member from just wandering down off-limits stacks and sneaking a glance into forbidden chapters? Again, we have real world practices to which the vast majority of people adhere to a vast majority of the time without a second thought. How often do you go through a red light? How often do you see anyone intentionally go through a red light? In all your years of driving, it's probably less than can be counted on one hand. Regardless of an individual driver's own moral compass, tardiness or reason for travel, drivers wait for the traffic light to change before proceding into the intersection. Even if traffic is visibly clear in both directions, even if no other cars are on the street, drivers will not cross an intersection without a green light. The reasons for consistently, unequivocally respecting traffic lights are the same for respecting the boundaries within the dataspace: 1) Only with the tacit expectation and implicit understanding that all participants adhere to the rules of the road can these roads be used safely, confidently and productively, and 2) that red light camera will trigger a ticket whether crossing the red light posed any danger or not. Similarly, since all data transactions have digital footprints, one step out of line will cost you your library card and all the strategic benefits of cooperation.

​

Just like a librarian ensures that all readers follow the rules and that no one takes home the entire collection, a neutral third party in the dataspace manages permissions and access. This approach safeguards data privacy, addresses concerns related to intellectual property, and encourages participation from various stakeholders.

​

In this digital library, managed by neutral third parties, data sovereignty is preserved, making it a space where information flows freely while respecting the boundaries and rights of all participants. It's a place where the librarian's code of ethics ensures that knowledge becomes a shared asset, contributing to collective progress without compromising individual integrity.





12 views0 comments

Recent Posts

See All

Data Spaces vs. Diamond Vaults

Centralized systems are the Achilles Heel of security Away from the grand Flemish Renaissance buildings in a rather average-looking office building is the Antwerp World Diamond Centre (AWDC), the publ

bottom of page