Architecting Digital Products: Start with the Terms of Use

Last time I sent a message, we were looking at constraints. I wanted you to understand that the constraints placed on you are your best friend. As part of the journey to build a candidate target architecture and roadmap, we talked about surfacing inconvenient facts. All to guide effective change. My team cornered me. They demanded I pivot and focus on a thorny data architecture problem for a client. Their pivot pulls my email messages because we use the drafting process to lock down demonstrated best-practice for enterprise architects.

So, this week, we are stepping away from roadmaps and going back to the digital fuel: Data Architecture.

If you recall our data series from last fall, I admitted I’ve always had a difficult relationship with Data Architecture. It is foundational. No great enterprise architecture exists without data and security architecture. Yet the common dry, obtuse discussion usually loses the business plot.

We lean heavily on DAMA's enterprise data model because it simply works. Those few pages of DMBOK are gold. Three simple models—Subject Model, Subject Area Model (SAM), and Logical Data Model (LDM) give you a complete Enterprise Data Model. 8-20 Subjects with 20ish entities in the SAM mean you have the foundation of understanding data governance, data flow, and data need with 160-400 words. That's it.

Then we hit a Digital Product.

You know the digital thing your company offers. Sometimes the whole company is organized around it, like ServiceNow. Sometimes it is embedded deep like Apple's Photos. Sometimes it sits beside services your company offers.

When we apply the classic DAMA model, it struggles—frankly, it breaks down. A Subject is a business-activity. Start with core business activities like Selling, Shipping, Invoicing, and Support. Sweet. Right here we have absolute clarity of core data governance. The boss of shipping owns shipping data. The boss of sales owns sales. You plan, you sell, you ship, you invoice, you support. The data flows sequentially across clean organizational boundaries.

Of course most teams trip on words like customer. Because they started with data, not business. When you start with the subject (business activity) you discover the words are buyer, receiver, payer and operator. Each with different relationships with your company—map the right relationship not a vague term like customer and everything becomes clear.

Right here an enterprise data landscape. Beautiful. Data governance and data flow leap off the page. You have a clear shared vocabulary with the business. The "Product" is simply an entity that weaves through your Subjects picking up additional data relationships.

Then, you get a digital product. Your customer logs onto your software and types their hopes, fears and dreams (Social media). Or they manage their IT ecosystem (ServiceNow). Or their phone takes location and date tagged photographs, and stores the image in your data repository.

How does the expression of a hope, the IP address used by the browser, the customer's internal CI ip-address, and where the customer's phone was a 11:25 PM Friday night fit into your enterprise data model?

A Tangled Mess

Fishing rod with the line in the reel all tangled

The Struggle with Digital Products

A Digital Product is fundamentally different because the customer is inside the machine. The product is embedded in activity. The customer often does it activity without us.

Think about ServiceNow—mainstream IT operations platform. The customer uses it to enter their CIs, their application portfolio. If we don't draw the line between product, and don't start with subjects, we face the infinite loop. Nor can we apply our Subjects (Business Activity) inside the product.

CIs were easy. We can clearly see ServiceNow corporation can have a CI used to operate the product and they have nothing to do with what is inside the product. The challenge is data that crosses the line. When the customer is engaged in our business process—when the customer creates a ServiceNow ID used to manage tickets and provide access to the product. That ID is now material to ServiceNow's Security Subject, Billing Subject, Customer Service Subject.

We cross the event horizon when we use data material to the product for our operations. Things are very weird when you cross the event horizon.

Quite simply, don't cross the event horizon.

Explicitly separate the Product Data Architecture from the Enterprise Data Architecture. The moment we start that journey we run into the elephant in the room: The Data Terms of Use.

Are You the Post Office or Facebook?

Separating Product Data from Enterprise Data, brings up the fundamental constraint—what are the terms of use of the data. We use Terms of Use everywhere in Navigate because it gives us the a key architectural constraint. Back in the Service-oriented Architecture days I used the 'bus test' to explain terms of use. A bus is a shared service, with strict terms of use. 1 ticket gets you one rider. 1 ticket at a bus stop gets you one rider on a pre-programed route. That ticket, route, and stop are only useful at scheduled times.

The driver doesn’t ask where you want to go, when you want to arrive, or if you want a ride home. Nor will the driver let a Zebra use the ticket. Clear Terms of Use.

We use a simple, stark comparison in our consulting engagements. When you build a digital product, are we the Post Office, or are we Facebook?

The Post Office provides a vital service: routing messages from a sender to a receiver. To do this, they need highly constrained metadata—the destination address, the return address, and the level of service you paid for. But here is the absolute constraint: They never look inside the envelope. Their architecture, their governance, and their data models are built around the assumption that the payload is none of their business. If a Post Office employee opens the mail to parse your letters and sell you targeted advertisements, that isn't a clever monetization strategy. It's a crime.

Now, Facebook. Facebook is the exact opposite. Yes, just like the Post Office they mediate communication. They keep track of relevant meta data to operate the service. But the content of your messages is the primary fuel for their business model. They open every message and parse it. They track what the message receiver does. They compare recipients and senders and topics and everything. They may as well root through our sock drawer to monetize contents, brand, type, and wear. Because the Terms of Use say they can.

Any term of use can work. Some terms of use, like WhatsApp are designed for intense privacy. Some, grant access to everything. Remember this isn't privacy—even Facebook doesn't publicize your hopes, dream, and obsessions. But they use them. They use them because the product terms allow them to. When you break terms of use you have a massive architectural failure. You failed to govern the boundary.

Terms of Use are always set by the owner. Service owner, product owner, facility owner, business area owner. It doesn't matter. Pragmatically, we reach for the Product Owner. Not any lightweight rep on an agile team—the person accountable for the product offered to our customers. The person who can balance the terms of use acceptable to customers with the terms acceptable to the business. Remember, many transit customer want a full time driver. Someone patiently waiting to take them wherever they want to go. And that service exists, at a different price point.

Assembly as the Ultimate Enforcement

Terms of Use give you a governable boundary. Tension lives at every boundary. Architecture thrives in addressing boundary conditions.

Apple's Photo "Memories" feature drives the tension. Apple provides common storage and sharing across their platform, which looks a lot like Facebook's community mediation. However, Apple's core value proposition is privacy. They ferociously defend their terms of use. They will go so far as to withdraw services from markets when they cannot provide you assurance there is no way for anyone to look in your Apple sock drawer without your active involvement.

On an internal side they do not spend a dime processing customer data to serve a warrant. Because they cannot look. They assert in court there is no backdoor.

Then they offer a service that looks at, and curates, your photos for you—memories. Yet their terms of use assure absolute privacy.

They address these hard constraints—Apple cannot look and your photos are curated—with strong application architecture. In Navigate terms, it's just using the Assembly Model.

Assembling functionality is a central task for an application architect. Assembly drives integration boundaries, lifecycle, and dependency—it is the critical application architecture challenge. We know that functionality can be placed anywhere. Literally anywhere. You can embed it in an enterprise application, expose it in a micro-service, or even hard-wire it into an ASIC.

To meet the data Terms of Use, Apple deliberately chooses to deploy AI Worker functionality directly onto the edge device—your iPhone. By pushing the compute and the data together, Apple physically separates themselves from the data. They knowingly abandon the upside of monetizing the customer.

Ignore what you’ve declared and the downside swoops in like vultures. Liability forces after‑the‑fact protection, breeding complexity, piling on technical debt and cost—plus a box of liability tucked in a dark corner.

When you have terms of use on your digital product, follow Apple. Create the application architecture, technology architecture, and security architecture that deliver on requirements.

Conclusion: Cut the Knot

If you do not start with product data and know your terms of service—Facebook who peeks for a living, Post Office who peeks when directed to, or Apple who cannot peek— your architecture inevitably drifts to liability.

Your hardest challenges are where your business operations are improved by using product data. The easy example is using the identities maintained by your customer inside your SaaS product to support access control, or support authorization.

You'll never untangle the knot by tweaking your "Sales", "Support", or "IT Operations" subjects. That is like pulling harder on the rope. It only tightens the knot. It is no different than having one more meeting about who owns customer.

My challenge this week is look at your Digital Products. Do you clearly and cleanly separate out Digital Products in your application architecture? How about your Data Architecture? Or do you blur everything into a tangle with the data to operate your business and the application support your business? Start pulling out your digital products as subjects. Start explicitly stating the Terms of Use. Start governing your architecture by following the directions you have been given.

Next week, I will show you exactly how we cut the knot. We will look at how to architect the boundary, establish clear constraints. We simply start by extending the out-of-the-box DAMA enterprise data model and treat every digital product as a DAMA Subject.

As always, I welcome your thoughts and feedback.

Have a great day!

Regards,

Dave Dave Hornford Conexiam

P.S. If untangling your data architecture is on your critical path, look into our Data Architecture Foundation Workshop. We’ll help you map your Subjects, define your Data Contracts, and ensure your Terms of Use are driving your architecture, not breaking it.

Agentic AI Playbook Conversations

Agentic AI Playbook Conversations We have been been deeply immersed in the evolving landscape of AI Adoption, engaging in a journey encompassing both technical intricacies and broader digital transformation. We developed the Business Leader’s Guide […]

Download AI Adoption Critical Capability Reference Architecture

Download AI Adoption Critical Capability Reference Architecture AI Adoption requires innovation thinking. Today we do not have proven best-practices for widespread AI Adoption that consistently improve our organizations. We require the ability to re-imagine our […]

Download Business Leader’s Guide to AI

Download Business Leader’s Guide to Artificial Intelligence Organizations that successfully apply innovative technology have had a competitive advantage. Innovative technology does not come with established success patterns and best practices. Innovative technology is novel and […]

Download the Introduction to the TOGAF Standard, 10th Edition

Download Introduction to the TOGAF® Standard, 10th Edition The TOGAF Standard, 10th Edition makes adoption of enterprise architecture best practices easier. It separates the universal concepts from proven best practice. The standard underscore where to […]

Download Capability-based Planning Guide

Download Capability-based Planning Guide Always drive to realize value. Half an improvement is 100% waste! No one teaches an Eagle to crawl, walk, or run. Eagles Fly! Download Teach your Eagles to Fly: Capability-based Planning […]

Download Business Architecture Capability Assessment Guide

Download Business Architecture Capability Assessment Guide Download a Business Architecture Capability Assessment Guide. Capability-based planning is one of the most powerful business architecture improvement techniques. Best practice of capability-based planning uses capability as a management […]

Download Sample Enterprise Architecture Principles

Download Sample Architecture Principles Download a sample enterprise architecture principles. Enterprise Architecture principles identify how to approach a problem or decision. The approach always drives you towards your enduring priorities. Download Sample Enterprise Architecture Principles […]

Download Enterprise Architecture Governance Guide

Download Enterprise Architecture Governance Guide Download the Enterprise Architecture Governance Guide to understand best practice to direct and control the development of architecture, and change to obtain the expected outcomes. Download Enterprise Architecture Governance Guide […]

Download TOGAF and SABSA Integration

Download TOGAF and SABSA Integration Bring SABSA, the world’s best security architecture framework, and TOGAF, the industry standard enterprise architecture framework together. Download TOGAF and SABSA Integration TOGAF and SABSA Integration Includes SABSA uses a […]

Download Enterprise Architecture Capability Reference Architecture

Download Enterprise Architecture Capability Reference Architecture The Enterprise Architecture Capability Reference Architecture will speed up establishing and enhancing your EA Team. Design your Enterprise Architecture Team for success. Identify and enhance the your enterprise architecture […]

Enterprise Architecture Training and TOGAF Training

Avolution ABACUS Training Course

Avolution ABACUS Training Effective enterprise architecture relies on formal modeling and analysis. We provide Avolution ABACUS training from hand-on enterprise architects. Students gain skills and knowledge to create integrated enterprise and domain architectures in this […]

Effective Online Education

Effective Online Education Effective online education works. Students to access the best available instructor. Students control the pace of their learning. Instructors can share rich supplemental material without distracting from the primary topic. Effective distance […]

Custom Enterprise Architecture Training

Custom Enterprise Architecture Training Custom enterprise architecture training addresses the professional development your EA Team needs. Good enterprise architects use a broad set of skills, method, in addition to specialized domain knowledge to develop enterprise […]

TOGAF Enterprise Architecture Training Course

Do you want training for TOGAF Certification? Demonstrate your knowledge of enterprise architecture with TOGAF Certification TOGAF® Enterprise Architecture Training Course Take a major step to be a better enterprise architect with TOGAF Standard, 10th […]

Business Architecture Training Course

Business Architecture Training Effective enterprise architecture relies on business architecture. The course gives students the skills and knowledge to develop business architecture in an enterprise architecture setting. Business architecture involves describing the structure of the […]

Enterprise Architect’s Kickstart

Enterprise Architect’s Kickstart We need to keep our skills current. More now than ever. Use the Enterprise Architecture Kickstart to improve your ability to deliver transformative enterprise architecture. This 90-day kick-start is how Conexiam Consulting […]

Go Further with Best Practice Enterprise Architecture Process and Method

Best practice enterprise architecture from Conexiam Navigate

Ensuring Alignment and Accountability: The Crucial Role of Enterprise Architecture Governance Checklists

Ensuring Alignment and Accountability: The Crucial Role of Enterprise Architecture Governance Checklists Enterprise Architecture Governance Checklists simplify enterprise architecture governance processes. The governance process needs to approve target architecture and provide implementation governance. A robust enterprise […]

Best Practices to Implement Enterprise Architecture Management Tools

Best Practices to Implement Enterprise Architecture Management Tools Enterprise Architecture Management Tools are designed to support the planning, design, analysis, and execution of enterprise architecture. They enable enterprise architects to examine the need for change […]

Using Scenario Analysis for Enterprise Architecture

Using Scenario Analysis for Enterprise Architecture A scenario is simply a plausible future. Scenario analysis looks at how we get to a plausible future and how different scenarios impact our current choices. Scenarios help leaders […]

Understanding Enterprise Architecture and Agile

Understanding Enterprise Architecture and Agile Both agile and enterprise architecture are designed to reduce risk. Agile software development excels at building something that we have never had before and do not know how to build. […]

Discover the Power of Enterprise Architecture Patterns

Discovering the Power of Enterprise Architecture Patterns: A Comprehensive Guide Every organization wants to improve. Streamline their operations. Enhance their enterprise agility. Align change with their strategies. Succeed at digital transformation. Enterprise Architecture, a discipline […]

Developing an Architecture View

Developing an Architecture View Enterprise architecture is an essential compass. It helps organizations navigate the complexities of technology, strategy, and operations. The core of enterprise architecture is a systematic approach. The objective is to ensure […]

Unlocking the Power of Capability-Based Planning: A Quick Guide

Unlocking the Power of Capability-Based Planning: A Quick Guide Are you looking for a more effective way to plan and execute your business strategy? Look no further than capability-based planning. Identifying and using your organization’s […]

Unlocking Your Business Potential: How to Create an Effective Capability Map

Unlocking Your Business Potential: How to Create an Effective Capability Map Are you struggling to identify the capabilities needed to take your business to the next level? Do you find it challenging to align resources […]

Making Smarter Choices: Why Your Business Needs Architectural Decisions

Making Smarter Choices: Why Your Business Needs Architectural Decisions Enterprises are constantly confronted with the challenge of making crucial decisions. Every day, decisions, including operational practices and technology selections, have a significant impact on a […]

Developing Enterprise Architecture Strategy

Developing Enterprise Architecture Strategy: Strategic Plan for Change Enterprise Architecture Strategy is action. Action your organization will take and the changes you will make to reach your strategic goals. Strategy development is all about choice. […]

Enterprise Architecture Governance Workshop

Enterprise Architecture Governance Workshop Enterprise Architecture Governance Workshops ensure your architecture project and implementation project have the architecture governance to succeed. You do not have time time to run failed improvement efforts. Enterprise Architecture Governance […]

Scenario-Based Architecture Roadmap Workshop

Scenario-Based Architecture Roadmap Workshop Scenario-Based Architecture Roadmap Workshops develop candidate architecture roadmaps using scenario analysis. Scenario analysis tied together with architecture roadmaps are powerful tools when used early in architecture development. When you need to […]

Stakeholder Engagement Workshop

Stakeholder Engagement Workshop Stakeholder Engagement Workshops start your architecture development on a firm footing. Understand your key stakeholders, their concerns, how to engage, and how to communicate. Get Help to Start Today Stakeholder Engagement Workshop […]

Data Architecture Foundation Workshop

Data Architecture Foundation Workshop Data Architecture Foundation Workshops develop string foundations for your data architecture. Used to set the state for Data Governance Initiatives and Data Initiatives. Understand your data landscape – what are the […]

Initiative Strategy Workshop

Initiative Strategy Workshop Initiative Strategy Workshops develop a strategy for an initiative. Used for new initiatives, and initiatives that have stumbled. Understand what actions are available to reach the outcome. Be able to articulate the […]

Enterprise Architecture Capability Workshop

Enterprise Architecture Capability Workshop The Enterprise Architecture Capability Workshop starts with your enterprise architecture use case and develops an improvement roadmap for your EA Team. The Enterprise Architecture Capability Workshop results in a designed EA […]

Scroll to Top
Secret Link