Data Marketplaces & Exchanges — Glossary of Terms and Marketing Use Cases
PDF download at bottom of page
Access Models (In-Place Share vs. File Delivery)
Summary: Zero-copy sharing within a cloud platform versus delivering files/exports to buyer storage.
Use Cases:
-
Choose in-place for secure analytics without data egress
-
Use file delivery for offline models or multi-cloud needs
API & Query Endpoints (SQL/Python)
Summary: Programmatic access to data products via SQL endpoints, REST APIs, or notebooks.
Use Cases:
-
Automate refresh and QA checks
-
Embed marketplace datasets directly into dashboards
Billing & Pricing Models (Subscription / Usage-Based)
Summary: Commercial models including flat subscriptions, per-row/scan usage, freemium trials, and minimums.
Use Cases:
-
Forecast cost using historical query volumes
-
Pick usage-based plans for bursty/seasonal analysis
Bring-Your-Own-Cloud (BYOC) / Native Sharing
Summary: Cross-account, same-cloud sharing (e.g., secure data sharing) without copying data.
Use Cases:
-
Avoid egress fees and duplication
-
Enable near real-time access with provider-controlled revocation
Catalog & Discoverability (Search/Tags/Metadata)
Summary: Marketplace catalogs with rich metadata, tags, and sample queries for discovery.
Use Cases:
-
Set alerts for new data in target categories
-
Standardize provider listings for easier evaluation
Clean Room Integrations
Summary: Privacy-preserving environments linked to marketplaces for matching and measurement.
Use Cases:
-
Run overlap and sales-lift studies safely
-
Activate audiences without exchanging raw PII
Consent, Rights & Provenance Metadata
Summary: Machine-readable fields for consent status, permitted purposes, territories, and source lineage.
Use Cases:
-
Enforce purpose limitation in workflows
-
Audit provenance during compliance reviews
Data Contracts & SLAs (Availability/Latency)
Summary: Explicit guarantees on uptime, freshness, schemas, and incident response.
Use Cases:
-
Bake SLAs into vendor scorecards
-
Trigger credits/escalations when SLAs are breached
Data Freshness & Update Cadence
Summary: How often a product is updated and latency from source to marketplace.
Use Cases:
-
Schedule triggers aligned to provider updates
-
Alert on stale datasets before reporting
Data Licensing (Permitted Use / Territory / Redistribution)
Summary: Legal terms defining what buyers may do with the data, where, and with whom.
Use Cases:
-
Ensure targeting/measurement rights before activation
-
Structure sublicensing for agency or partner usage
Data Lineage & Audit Trails
Summary: Visibility into upstream sources and full audit logs of access and transformations.
Use Cases:
-
Resolve metric mismatches quickly
-
Satisfy regulatory audit requests with lineage proofs
Data Packaging (Tables / Views / Delta Feeds / Parquet)
Summary: How the product is delivered for analytics, including streaming/delta options.
Use Cases:
-
Pick delta feeds for incremental pipelines
-
Use views for governed row/column access
Data Product Readiness (Docs/Tests/SLOs)
Summary: Operationalized datasets with documentation, sample notebooks, tests, and objectives.
Use Cases:
-
Score vendors on product maturity
-
Model internal datasets after best-in-class products
De-identification & Re-identification Risk
Summary: Safeguards (hashing, aggregation, DP) and policies prohibiting re-identification.
Use Cases:
-
Require DP/noise for small cells
-
Set penalties for attempted re-identification in contracts
Entitlements, Seats & Revocation
Summary: Granular access rights by user/team with the ability to revoke instantly.
Use Cases:
-
On/Offboard teams via groups, not individuals
-
Restrict downloads to analysis roles only
Evaluation Sandboxes & Trials
Summary: Time-limited trials, sample slices, and query-only sandboxes for assessment.
Use Cases:
-
Back-test quality before purchase
-
Estimate match rates using safe samples
Fulfillment Channels (S3/GCS/ADLS/API)
Summary: Delivery via cloud storage, direct shares, or APIs with webhooks for changes.
Use Cases:
-
Automate ingestion via cloud-native connectors
-
Use webhooks to trigger downstream jobs
Interoperable IDs & Match Keys (HEM/MAID/Persistent IDs)
Summary: Standardized keys enabling joining across buyers/sellers under privacy controls.
Use Cases:
-
Plan identity strategy for highest match rate
-
Use clean room connectors for safe joins
KYC/KYB & Compliance Vetting
Summary: Know-your-customer/business checks on buyers/sellers to reduce risk.
Use Cases:
-
Screen sellers for sanctions and compliance
-
Require KYB before enabling sensitive categories
Monetization & Revenue Share (Providers)
Summary: Packaging and pricing strategies, revenue splits, and payout schedules for sellers.
Use Cases:
-
Pilot premium tiers (freshness, granularity)
-
Negotiate revenue share on private deals
Observability & Usage Telemetry
Summary: Metrics on queries, scans, and downloads for cost control and product improvement.
Use Cases:
-
Chargeback costs to internal teams
-
Prioritize schema optimizations by heavy usage paths
Private Listings / Exchanges (Invite-Only)
Summary: Non-public offers with bespoke terms and curated buyer groups.
Use Cases:
-
Offer category-exclusive deals to key brands
-
Protect sensitive vertical data with gated access
Quality Scoring (Coverage / Accuracy / Bias)
Summary: Objective metrics and vendor attestations about data quality dimensions.
Use Cases:
-
Benchmark providers before switching
-
Monitor drifts in coverage or accuracy over time
Region & Residency Controls / Cross-Region Sharing
Summary: Constraints and features for in-region processing and cross-region replication.
Use Cases:
-
Keep EU data in-region to meet GDPR
-
Serve APAC buyers via region-local replicas
Schema Evolution & Versioning
Summary: Versioned schemas, deprecation notices, and changelogs to avoid breaking changes.
Use Cases:
-
Pin to versions and plan migrations
-
Automate schema diff alerts in CI/CD
Security (Encryption, Masking, Row-Level Access)
Summary: Provider security posture: encryption at rest/in transit, masking, and fine-grained controls.
Use Cases:
-
Apply least-privilege policies
-
Log and alert on anomalous query patterns
Standard Vocabularies & Metadata (DCAT / Open Data Contracts)
Summary: Common metadata models for consistent discovery and ingestion.
Use Cases:
-
Accelerate onboarding via standardized fields
-
Auto-generate docs from data contracts
Terms of Use & Acceptable Use Policies
Summary: Operationalized restrictions (no scraping, no re-identification, category limits).
Use Cases:
-
Implement policy checks pre-activation
-
Audit partners for AUP compliance
Trial-to-Production (POC) Workflow
Summary: Defined path from evaluation to paid use with checkpoints and success criteria.
Use Cases:
-
Reduce time-to-value with template POCs
-
Codify handoff from data science to ops
Usage Reporting & True-Up (Rows/Scans/Seats)
Summary: Metering and reconciliation to align invoices with actual consumption.
Use Cases:
-
Prevent overage surprises with alerts
-
Negotiate minimums with true-up flexibility
Watermarking / Fingerprinting (Leak Detection)
Summary: Hidden markers or statistical fingerprints to trace leaks and enforce terms.
Use Cases:
-
Detect unauthorized redistribution
-
Prove lineage in disputes

