Often this is aggregated, non-identifiable data, yet organizations must be aware of instances of data sharing by third parties, data aggregators, ad servers, targeting technologies and other solutions that potentially compromise restricted access to your digital data. 4.