ACXIOM – Data Clean Rooms

INDUSTRY

Data & marketing

ROLE

UX Lead

team

2 Designers

PRODUCT

SaaS Web App

Year

2023

project overview

Acxiom is a global data and marketing technology company that specializes in identity resolution, data management, and privacy-safe data solutions for enterprise brands. For decades, Acxiom has worked at the intersection of data, advertising, and consumer intelligence, helping major organizations unify fragmented customer data and activate it across channels.

They needed to enter and compete in the growing Data Clean Room market. The goal was to design a secure, privacy-first web platform that would allow organizations to collaborate on first-party datasets, generate insights, and run overlap, gap and conversion analysis without exposing raw user-level data.

the challenge

The core challenges were:

  • Turning abstract privacy-preserving mechanics into understandable workflows

  • Designing for low and highly technical users without overwhelming them

  • Structuring collaboration models that balance flexibility with strict compliance

  • Making key-based matching and normalization concepts visible without exposing identity

  • Creating confidence in a system where users never actually “see” the underlying data

Unlike traditional SaaS tools, a data clean room operates on invisible logic. Users configure datasets, define keys, run queries, and generate reports without ever touching raw PII. The experience had to communicate trust, clarity, and control at every step.

Additionally, there was no time for extended discovery or low-fidelity exploration. The flows had to be architected correctly from the start, then translated directly into high-fidelity designs that could move into validation quickly.

This was infrastructure-level UX in a privacy-sensitive environment. If the structure failed, the entire system would feel unsafe or unusable.

MY ROLE & Scope

I led the UX direction of the platform.

Responsibilities included:

  • Competitive analysis

  • Terminology research and domain understanding

  • End-to-end user flow definition

  • Interaction modeling

  • High-fidelity design

  • Prototype testing with internal users

  • Final product refinement

I collaborated with:

  • One internal UX designer (I guided and structured the process)

  • A Product Manager

  • Engineering teams

I drove the UX thinking and system structure. This was a strategic UX leadership role within a technically complex product.

APPROACH

The approach was structured into four focused stages to ensure strategic clarity before moving into execution. Given the technical complexity of data clean rooms and the tight timeline, each stage built on the previous one, from understanding the domain, to analyzing competitive infrastructure, to architecting the full product experience, to prototype and test/iterate. The following phases outline how the foundation was established before designing the platform at high fidelity.

Phase 1 – Domain Immersion

Phase 1 – Domain Immersion

Before designing anything, I had to deeply understand the terminology.

Data clean rooms have their own language:
Key fill rate, normalization, direct identifiers, event-level data, ID graphs, AAID, IDFA, global schema, overlap, seed audiences, etc.

To avoid designing blindly, I created a full glossary of core terms and mapped how they relate to user actions.

This step was critical. Without mastering the language, the flows would break.

Phase 2 – Competitive Analysis

I conducted a deep analysis of platforms like:

  • Infosum

  • Adobe Experience Platform

I mapped:

  • All major navigation structures

  • Dataset ingestion patterns

  • Collaboration setup flows

  • Permission models

  • Segment creation logic

  • Query builders

  • Connection configuration

  • Reporting dashboards

I didn’t just look at visuals. I mapped the behavioral logic of each action.

This allowed me to understand:

  • How datasets are normalized

  • How keys are matched securely

  • How audience intersections are computed

  • How user permissions restrict query access

Only after understanding the mechanics could I start designing responsibly.

Phase 3 – Experience Architecture & Flows

Before any screens were designed, I mapped:

  • Dataset creation flows

  • Collaboration setup flows

  • Key mapping and join configuration

  • Connection setup between partners

  • Report execution logic

  • End-to-end user journeys

The clean room model revolves around a few core pillars:

  1. Datasets

  2. Collaborations

  3. Connections

  4. Reports

Everything had to orbit these four foundations.

Given timeline constraints, there was no low-fidelity phase. I moved directly into high-fidelity, but only after validating the flows thoroughly.

Phase 4 – Testing & Iteration

I tested prototypes with internal users before release.

The focus of testing was:

  • Terminology clarity

  • Query comprehension

  • Permission understanding

  • Confidence in running reports

  • Error prevention

Given the complexity of the system, reducing ambiguity was critical.

After testing, I refined:

  • Navigation clarity

  • Action hierarchy

  • Permission labeling

  • Feedback states

SOLUTION

The platform was designed around four foundational experience areas that define how a data clean room operates: dataset creation, collaboration setup, connection configuration, and reporting. Each area represents a critical layer of the system, moving from secure data ingestion to privacy-safe analysis. Together, they form the operational backbone of the product while maintaining strict control over identity and access.

Dataset Creation

he platform needed a structured ingestion experience.

Key considerations:

  • Multiple data source inputs

  • File validation and status feedback

  • Schema mapping

  • Key identification and normalization

  • Join key configuration

The design ensures users can:

  • Select data sources

  • Define primary keys

  • Normalize datasets

  • Configure matching fields

  • Monitor ingestion status

All without exposing direct identifiers.

Collaboration Setup

Clean rooms are built on trust boundaries.

The collaboration feature allows organizations to:

  • Define partner participants

  • Control dataset access

  • Set granular permissions

  • Restrict query capabilities

  • Prevent unauthorized exports

Permissions were designed carefully to avoid accidental data leakage.

Users can configure:

  • Data insight permissions

  • Output restrictions

  • Query rights

  • Export controls

This is where UX meets compliance.

Connections

Connections define how datasets interact.

Users can:

  • Select participating datasets

  • Define matching keys

  • Configure join logic

  • Create union, intersect, or exclude queries

  • Run controlled analysis

The configuration panel had to make complex logic feel manageable.

Matching happens through anonymized keys.
No raw PII is exposed.

Reports & Analysis

Once connections are configured, users can generate:

  • Overlap reports

  • Gap analysis

  • Conversion reports

  • Aggregated audience metrics

The system visualizes intersections, counts, percentages, and comparison metrics.

All results are aggregated.
No user-level data leaves the environment.

Privacy remains intact.

results
& impact

The result was a competitive Data Clean Room platform capable of secure dataset ingestion, controlled multi-party collaboration, privacy-preserving identity matching, and actionable reporting built on aggregated insights. The architecture was designed for scalable expansion, allowing new partners, datasets, and analytical use cases to be added without compromising governance. With this foundation, Acxiom positioned itself within a high-growth category where privacy compliance and first-party data strategy are no longer optional, but central to enterprise marketing infrastructure.

Conclusion

Designing a data clean room platform was a different level of complexity. It was not about improving an existing interface. It was about translating invisible infrastructure into something usable and trustworthy.

The most challenging part was that users never actually see the data they are working with. Everything happens through keys, permissions, and controlled queries. That forced me to think carefully about clarity, terminology, and trust. If the structure was confusing, the entire system would feel unsafe.

This project pushed me to operate at a more strategic level. I had to immerse myself in a highly technical domain, dissect competitive infrastructure, and define experience architecture before even thinking about screens. It reinforced how critical system thinking is when designing products that handle sensitive data.

More than anything, it showed me how UX sits at the intersection of privacy, engineering, and business strategy, and how much responsibility comes with designing tools that operate in secure environments.