Working with Sensitive or Confidential Data John Southall Bodleian Data Librarian Subject Consultant for Economics, Sociology, Social Policy and.

Slides:



Advertisements
Similar presentations
Reconciling the sharing of research data with ethical review for research with people as participants Dr Veerle Van den Eynden UK Data Archive Data support.
Advertisements

Advice on Consent and Confidentiality for Sharing Research Data Ethics and Consent issues: one-day workshop Belfast, 18 January 2005 John Southall.
Reconciling the sharing of research data with ethical review for research with people as participants Veerle Van den Eynden UK Data Archive Data Support.
ESDS Qualidata Processing Data John Southall ESDS Qualidata, UKDA IASSIST WORKSHOP 27 May 2003.
Qualitative Data:Preparation and Use John Southall Senior Qualitative Data & Support Services Officer Qualidata.
Dealing with confidential research information anonymisation techniques and other measures to enable using and sharing research data Data Management and.
Anonymisation techniques and other measures to enable using and sharing research data Managing and Sharing Research Data workshop London, 2 December 2009.
Is Mobility of Data a Special Problem for Qualitative Research? John Southall ESDS Qualidata A service provider of the UK Data Archive.
Dealing with confidential research information and consent agreements in research Louise Corti Associate Director UK Data Archive University of Glamorgan.
Regional Seminar on Census Data Archiving for Africa, Addis Ababa, Ethiopia, September 2011 Overview of Archiving of Microdata Session 4 United Nations.
Using the Internet to Conduct Research What Investigators and IRB Members Should Know -- January 29, Lisa Shickle, MS Analyst, VCU Massey Cancer.
ASSESSMENT IN EDUCATION ASSESSMENT IN EDUCATION. Copyright Keith Morrison, 2004 PERFORMANCE ASSESSMENT... Concerns direct reality rather than disconnected.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Lifecycle Metadata for Digital Objects November 22, 2004 Usage and Rights Management Metadata.
RESEARCH ETHICS AND DATA CONFIDENTALITY: ANONYMISATION AND ACCESS CONTROL ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………......…...
Introduction ESDS Qualidata John Southall ESDS Creating and delivering re-usable qualitative data 24 June 2004.
HETUS Pilot Group 8 Privacy procedures and ethical issues Kimberly Fisher, Centre for Time Use Research – co-ordinator External consultant Kai Ludwigs.
Conducting a research project. Clarify Aims and Research Questions Conduct Literature Review Describe methodology Design Research Collect DataAnalyse.
CIS-2005 : Xi’an - China 1 A New Conceptual Framework within Information Privacy: Meta Privacy Mr. Geoff Skinner Dr Song Han Prof. Elizabeth Chang Curtin.
Because good research needs good data The DCC lifecycle model, Exeter Uni, May 2011 Funded by: The Digital Curation Lifecycle Model Joy Davidson.
Ethics and Educational Research. The aims of the session  To consider the ethical values that inform educational research  To reflect on our own values.
Expanding the Role of Synthetic Data at the U.S. Census Bureau 59 th ISI World Statistics Congress August 28 th, 2013 By Ron S. Jarmin U.S. Census Bureau.
Sensitive Data. Agenda Howard Noble – Research Support ACIT (IT Services) Rowan Wilson – Research Support ACIT (IT Services) Claudia Kozeny-Pelling –
The Protection of Confidential Commercial or Industrial Information in Environmental Law: Analysis and Call for a Graded Concept of Protection Prof. Dr.
Introduction To DBMS.
Unit 12 Strategy in Action Professor John Tribe
Chapter 6 Negotiating access and research ethics
Frameworks for Sensitive Data in the Research Lifecycle
Sexting case study Every case is unique, taking risk factors into consideration to aid decision making. No clear definite answers but safeguarding the.
Researching the Social World
Data Accessibility, Confidentiality and Copyright United Nations Statistics Division Demographic Statistics Section.
Errors, Fraud, Risk Management, and Internal Controls
Research data management activity in Leeds
Dining with Diabetes IRB Training 2017.
Advance Software Engineering
Active Data Management in Space 20m DG
Business Drivers and Requirements
Dissemination Workshop for African countries on the Implementation of International Recommendations for Distributive Trade Statistics May 2008,
Fiscal Mapping Community of Practice
Pre-Close Rules of Engagement
Section 3: Sweep implementation
Alignment Dr. Mary Clisbee
Chapter 6 Negotiating access and research ethics
Peer Observation & Review of Teaching (P.O.R.T.)
GDPR and Health and Safety
G.D.P.R General Data Protection Regulations
The Public Sector Equality Duty
CAMPUT Regulatory Key Topics Meeting Montreal, January 28-30, 2018
Introduction to Research Data Management
Data Quality By Suparna Kansakar.
The new data protection rules
Privacy and Digital Rights Management
Ethical questions on the use of big data in official statistics
Obj. 2.2 Discuss considerations involved before, during and after an interview To view this presentation, first, turn up your volume and second, launch.
GDPR (General Data Protection Regulation)
Business Relationship Management
Healthcare Privacy: The Perspective of a Privacy Advocate
The interoperability challenge
BETTER AND PROPER ACCESS TO PACIFIC MICRODATA
UNODC-UNECE Manual on Victimization Surveys: Content
Open Archival Information System
Data Management Ethical considerations for educational research
High-level Working Group on Statistical Confidentiality
The Public Sector Equality Duty
Policy Frameworks: building a firm foundation for your IR
Chapter 6 Negotiating access and research ethics
“Seven-minute Staff Meeting”
Ethics & Data Management
Emotional Intelligence: The Core of Family Offices
The Role of Metadata in Census Data Dissemination
Presentation transcript:

Working with Sensitive or Confidential Data John Southall Bodleian Data Librarian Subject Consultant for Economics, Sociology, Social Policy and Intervention 2015

Types of Data Numerical Text based Audio Visual Each are representations of information that may be confidential Goal: understand impact of this on research process and manage it Staring point is to think about why your data is considered confidential or sensitive in some way.

Focus on Reasons Why confidential? Is it because of... General content Particular content Undertakings given to research participants Focus on the reasons because each will contain the seeds of the solution

General Content Subject matter as a whole is sensitive or confidential Non-sensitive elements cannot be separated The next question to think about why your data is considered confidential or sensitive in some way.

Particular Content Are there specific sections that are confidential Example; survey data where post codes have been collected as one of the variables Example; Interview data that includes names and accounts of illegal activity Possibility of tagging and removal? The next question to think about why your data is considered confidential or sensitive in some way.

Consent Undertakings Poorly worded participation agreements may over emphasise sensitivity Help ensure participation Avoid agreements that are too restrictive “only to be used by this researcher” “will be destroyed” “No one else will read” Helpful but not too restrictive The next question to think about why your data is considered confidential or sensitive in some way.

Overall Data type is never the real problem e.g. Audio data It’s confidential because of... General or particular content Consent agreements Each will shape how you use data And how it will be preserved and shared Data format – blanket assumptions that data is sensitive because it is a recording per se are wrong. It is still about content that needs to be blurred or restricted.

Sharing thoughts on this Understanding reasons your data is confidential helps you think about how to make best use of it Now - in your current project In the future RDM support network at Oxford and Data Librarian are here to discuss and support

Dealing with the issues At collection stage Usage and access during your project How it will be accessed after the project

Informed Consent Undertakings need to encourage participation Create trust BUT also produce workable data Look at examples Pilot your agreements Negotiate

Elements of Data Storage Securely holding the data is only one part Enabling efficient access Short term Long term Encryption / disaster planning Managing data Version control Honouring agreements made

Blurring, Masking or Anonymisation Light touch; limited key identifiers e.g. Names and addresses only Replacement / Pseudonyms – data blurring Aggregation – fine grain detail/numbers removed Perturbation e.g. Barnardisation Randomised sampling

Blurring, Masking or Anonymisation Perhaps best used for particular content Removing columns from spreadsheets Specific names/words in transcripts But – too blunt a tool? Dangers of data degradation or distortion Is there an alternative?

Restricting Access Anonymisation allows wide access to data by removing content An alternative approach is to leave detail but make access harder E.g. Microdata from Eurostat Vetting of access from UKDS Create clear access and usage conditions Restrict what content may be reproduced Introduce embargoes (last resort)

Restricting Access Best for concerns about general content? Has to be planned from beginning Effective or credible policing of restrictions needed Both approaches can increase usage potential of data but require planning

Typical Restrictions For a specific research project only Cannot be shared or preserved afterwards Non-commercial use Source cited Re-purposing by permission Tabulation or other visualisations Copyright and Theses It is your responsibility to be clear on what restrictions a third party data supplier imposes

Some Tactics to Allow Effective Use Document the research process Metadata that captures decisions and choices Pilot consent paperwork Think about what could go wrong! Collecting inappropriate data Hardware /software failure Theft Confusion over multiple versions Managing accusations of disclosure

Confidentiality (Conclusion) Content is only starting point Actual issue is how information will be used, managed, and disseminated. Maintain confidentiality through controls on handling, storage and sharing Draw on RDM support at Oxford Make decisions that allow research design to reduce risks of disclosure