{"id":4712,"date":"2025-01-28T06:29:43","date_gmt":"2025-01-28T06:29:43","guid":{"rendered":"https:\/\/bullseye.ac\/blog\/?p=4712"},"modified":"2025-01-28T06:29:45","modified_gmt":"2025-01-28T06:29:45","slug":"the-complexities-of-data-sharing-agreements","status":"publish","type":"post","link":"https:\/\/bullseye.ac\/blog\/business\/the-complexities-of-data-sharing-agreements\/","title":{"rendered":"The Complexities of Data Sharing Agreements"},"content":{"rendered":"\n<p>Number of words: 370<\/p>\n\n\n\n<p>The key to this type of technology collaboration lies with human values and processes and not just a focus on technology. Organizations need to decide whether and how to share data, and if so, on what terms. A few principles will be foundational.<\/p>\n\n\n\n<p>The first is concrete arrangements to protect privacy. Given the evolution of privacy concerns, this is a prerequisite both for enabling organizations to share data about people and for people to be comfortable sharing data about themselves. A key challenge will involve the development and selection of techniques to share data while protecting privacy. This will likely include new so-called \u201cdifferential privacy\u201d techniques that protect privacy in new ways, as well as providing access to aggregated or de-identified data or enabling query only access to a data set. It may also involve the use of machine learning that is trained on encrypted data. We may well see new models emerge that enable people to decide whether to share their data collectively for this type of purpose.<\/p>\n\n\n\n<p>A second critical need will involve security. Clearly, if data is federated and accessible by more than one organization, the cyber security challenges of recent years take on an added dimension. While part of this will require continuing security enhancements, we\u2019ll also need improvements in operational security that enable multiple organizations to manage security together.<\/p>\n\n\n\n<p>We\u2019ll also need practical arrangements to address fundamental questions around data ownership. We need to enable groups to share data without giving up their ownership and ongoing control of the data they share. Just as landowners sometimes enter into easements or other arrangements that allow others onto their property without losing their ownership rights, we\u2019ll need to create new approaches to manage access to data. These must enable groups to choose collaboratively the terms on which they want to share data, including how the data can be used.<\/p>\n\n\n\n<p>In addressing all these issues, the open-data movement can take a page from open-source trends for software. At first that effort was hampered by questions about license rights. But over time standard open-source licenses emerged. We can expect similar efforts for data.<\/p>\n\n\n\n<p><em>Excerpted from pages 282 to 283 of \u2018Tools and Weapons\u2019 by Brad Smith and Carol Browne<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Number of words: 370 The key to this type of technology collaboration lies with human values and processes and not just a focus on technology. Organizations need to decide whether and how to share data, and if so, on what terms. A few principles will be foundational. The first is concrete arrangements to protect privacy. &#8230; <a title=\"The Complexities of Data Sharing Agreements\" class=\"read-more\" href=\"https:\/\/bullseye.ac\/blog\/business\/the-complexities-of-data-sharing-agreements\/\" aria-label=\"More on The Complexities of Data Sharing Agreements\">Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_uag_custom_page_level_css":"","footnotes":""},"categories":[83,7],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Complexities of Data Sharing Agreements - BullsEye<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bullseye.ac\/blog\/business\/the-complexities-of-data-sharing-agreements\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Complexities of Data Sharing Agreements - BullsEye\" \/>\n<meta property=\"og:description\" content=\"Number of words: 370 The key to this type of technology collaboration lies with human values and processes and not just a focus on technology. Organizations need to decide whether and how to share data, and if so, on what terms. A few principles will be foundational. The first is concrete arrangements to protect privacy. ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bullseye.ac\/blog\/business\/the-complexities-of-data-sharing-agreements\/\" \/>\n<meta property=\"og:site_name\" content=\"BullsEye\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-28T06:29:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-28T06:29:45+00:00\" \/>\n<meta name=\"author\" content=\"Bhavya Chowdhury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bhavya Chowdhury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bullseye.ac\/blog\/business\/the-complexities-of-data-sharing-agreements\/\",\"url\":\"https:\/\/bullseye.ac\/blog\/business\/the-complexities-of-data-sharing-agreements\/\",\"name\":\"The Complexities of Data Sharing Agreements - BullsEye\",\"isPartOf\":{\"@id\":\"https:\/\/bullseye.ac\/blog\/#website\"},\"datePublished\":\"2025-01-28T06:29:43+00:00\",\"dateModified\":\"2025-01-28T06:29:45+00:00\",\"author\":{\"@id\":\"https:\/\/bullseye.ac\/blog\/#\/schema\/person\/992754c8575e3584d4c0dbcab059dd23\"},\"breadcrumb\":{\"@id\":\"https:\/\/bullseye.ac\/blog\/business\/the-complexities-of-data-sharing-agreements\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bullseye.ac\/blog\/business\/the-complexities-of-data-sharing-agreements\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bullseye.ac\/blog\/business\/the-complexities-of-data-sharing-agreements\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/bullseye.ac\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Complexities of Data Sharing Agreements\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bullseye.ac\/blog\/#website\",\"url\":\"https:\/\/bullseye.ac\/blog\/\",\"name\":\"BullsEye\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bullseye.ac\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/bullseye.ac\/blog\/#\/schema\/person\/992754c8575e3584d4c0dbcab059dd23\",\"name\":\"Bhavya Chowdhury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/bullseye.ac\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/96cc080647ada77871a0fe51c103b135?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/96cc080647ada77871a0fe51c103b135?s=96&d=mm&r=g\",\"caption\":\"Bhavya Chowdhury\"},\"url\":\"https:\/\/bullseye.ac\/blog\/author\/bhavya-chowdhury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Complexities of Data Sharing Agreements - BullsEye","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bullseye.ac\/blog\/business\/the-complexities-of-data-sharing-agreements\/","og_locale":"en_US","og_type":"article","og_title":"The Complexities of Data Sharing Agreements - BullsEye","og_description":"Number of words: 370 The key to this type of technology collaboration lies with human values and processes and not just a focus on technology. Organizations need to decide whether and how to share data, and if so, on what terms. A few principles will be foundational. The first is concrete arrangements to protect privacy. ... Read more","og_url":"https:\/\/bullseye.ac\/blog\/business\/the-complexities-of-data-sharing-agreements\/","og_site_name":"BullsEye","article_published_time":"2025-01-28T06:29:43+00:00","article_modified_time":"2025-01-28T06:29:45+00:00","author":"Bhavya Chowdhury","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bhavya Chowdhury","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bullseye.ac\/blog\/business\/the-complexities-of-data-sharing-agreements\/","url":"https:\/\/bullseye.ac\/blog\/business\/the-complexities-of-data-sharing-agreements\/","name":"The Complexities of Data Sharing Agreements - BullsEye","isPartOf":{"@id":"https:\/\/bullseye.ac\/blog\/#website"},"datePublished":"2025-01-28T06:29:43+00:00","dateModified":"2025-01-28T06:29:45+00:00","author":{"@id":"https:\/\/bullseye.ac\/blog\/#\/schema\/person\/992754c8575e3584d4c0dbcab059dd23"},"breadcrumb":{"@id":"https:\/\/bullseye.ac\/blog\/business\/the-complexities-of-data-sharing-agreements\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bullseye.ac\/blog\/business\/the-complexities-of-data-sharing-agreements\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/bullseye.ac\/blog\/business\/the-complexities-of-data-sharing-agreements\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bullseye.ac\/blog\/"},{"@type":"ListItem","position":2,"name":"The Complexities of Data Sharing Agreements"}]},{"@type":"WebSite","@id":"https:\/\/bullseye.ac\/blog\/#website","url":"https:\/\/bullseye.ac\/blog\/","name":"BullsEye","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bullseye.ac\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/bullseye.ac\/blog\/#\/schema\/person\/992754c8575e3584d4c0dbcab059dd23","name":"Bhavya Chowdhury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bullseye.ac\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/96cc080647ada77871a0fe51c103b135?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/96cc080647ada77871a0fe51c103b135?s=96&d=mm&r=g","caption":"Bhavya Chowdhury"},"url":"https:\/\/bullseye.ac\/blog\/author\/bhavya-chowdhury\/"}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Bhavya Chowdhury","author_link":"https:\/\/bullseye.ac\/blog\/author\/bhavya-chowdhury\/"},"uagb_comment_info":0,"uagb_excerpt":"Number of words: 370 The key to this type of technology collaboration lies with human values and processes and not just a focus on technology. Organizations need to decide whether and how to share data, and if so, on what terms. A few principles will be foundational. The first is concrete arrangements to protect privacy.&hellip;","_links":{"self":[{"href":"https:\/\/bullseye.ac\/blog\/wp-json\/wp\/v2\/posts\/4712"}],"collection":[{"href":"https:\/\/bullseye.ac\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bullseye.ac\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bullseye.ac\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/bullseye.ac\/blog\/wp-json\/wp\/v2\/comments?post=4712"}],"version-history":[{"count":1,"href":"https:\/\/bullseye.ac\/blog\/wp-json\/wp\/v2\/posts\/4712\/revisions"}],"predecessor-version":[{"id":4713,"href":"https:\/\/bullseye.ac\/blog\/wp-json\/wp\/v2\/posts\/4712\/revisions\/4713"}],"wp:attachment":[{"href":"https:\/\/bullseye.ac\/blog\/wp-json\/wp\/v2\/media?parent=4712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bullseye.ac\/blog\/wp-json\/wp\/v2\/categories?post=4712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bullseye.ac\/blog\/wp-json\/wp\/v2\/tags?post=4712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}