Sharing can happen on different levels; within an organisation, within a closed but controlled set of actors, or - the point of no return - freely shared.

Slides:



Advertisements
Similar presentations
Exercise Science The Legal & Professional Responsibilities of Personal Trainers.
Advertisements

In Europe, When you ask the VET stakeholders : What does Quality Assurance mean for VET system? You can get the following answer: Quality is not an absolute.
How does a well written business plan affect the future of a business?
1 Pertemuan 19 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
COPYRIGHT, LEGAL ISSUES & TAKEDOWN. 2 Work priorities Orphan Works ALRC review Copyright and the Digital Economy Creative Commons licenses Legal.
Dealing with confidential research information and consent agreements in research Louise Corti Associate Director UK Data Archive University of Glamorgan.
Department of Public Health and Primary Care Health Needs Assessment in Prisons: The Professional View and the Client View Helen Thornton-Jones
Slide 1 D2.TCS.CL5.04. Subject Elements This unit comprises five Elements: 1.Define the need for tourism product research 2.Develop the research to be.
Education Support Assessment 1 Hints and tips Plagiarism  Read the info about plagiarism in your admin pack  Watch the admin lecture  Don’t risk getting.
CRITICAL APPRAISAL OF SCIENTIFIC LITERATURE
Risk assessments. Aims Follow safe working practices Objectives To define a hazard To define a risk List ways in which a hazard can be minimised Complete.
OER, IPR, and the Law The Good, The Bad and The Ugly? 20 October 2009.
Critically reviewing a journal Paper Using the Rees Model
6 Steps for Resolving Conflicts STEP 1. Begin the Process Calmly approach the person you are having the conflict with, and explain to them that you have.
When is a student not a student? Welcome to this Eduserv tool for helping you determine which students should be allowed to access online resources.
Evaluating Engagement Judging the outcome above the noise of squeaky wheels Heather Shaw, Department of Sustainability & Environment Jessica Dart, Clear.
Legal Issues Repositories Support Project Winter School, New Lanark Thursday 26 th February 2009 Morag Greig, Advocacy Manager (Enlighten) University of.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
COMMUNICATION ENGLISH III September 27/28 th 2012.
Learning Outcomes LO3 Understand how to respond to evidence or concerns that a child has been abused or harmed. AC 3.1 Describe signs, symptoms, indicators.
Brussels Privacy Symposium on Identifiability
Lesson Objectives: Explain the importance of reflective practice in continuously improving the quality of service provided (Outcome 2.1) Describe how.
Designing Scoring Rubrics
Research Methods for Business Students
QUALITY ASSURANCE.
Morag Greig, Advocacy Manager (Enlighten) University of Glasgow
Starting from the end: what to do when restricted data is released
Literature review Methods
Research Process №5.
Anonymisation: Theory and Practice
Understand the principles of effective decision making
World Health Organization
RESPONSIBLE DATA: WHAT IS IT AND WHY SHOULD WE CARE?
ITPD ISSUE MANAGEMENT PROCESS SEPTEMBER 5, 2008
Risk Register I want to plan a project
NPQonline - Final Assessment
Radar Watchkeeping: Have you monitored your Communication department’s radar to avoid collisions with the new Regulation? 43rd EDPS-DPO meeting, 31 May.
GENERAL DATA PROTECTION REGULATION (GDPR)
All data occupies physical space, even if we don't think of it as such.
Grievance, Discipline & Dismissal
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Writing for academic publication: introduction to the presentation and formatting of research papers Rod Gameson.
Operations Director, CTRU
Early Childhood Services Succession Planning Framework
Why ISO 27001? Subtitle or presenter
Why are you collecting data in the first place
Thursday 12th March 2014 Mr Nicholls
General Data Protection Regulation
INFORMATION TECHNOLOGY PRESENTATION
Building Capacity on Protected Areas Law & Governance
Preparing for the GDPR - What do we need to do if we process children’s personal data? Data Protection Practitioners’ Conference 2018 #DPPC2018.
Why ISO 27001? MARIANNE ENGELBRECHT
Viable Proposals: Planning & Securing Buy-in
BETTER AND PROPER ACCESS TO PACIFIC MICRODATA
In short, yes, you are. Data is everywhere, whether we recognise it or not, and it can be qualitative (eg. words or photos) or quantitative (eg. spreadsheets.
Quality Assurance Framework
Considerations in Development of the SBSTA Five Year Programme of Work on Adaptation Thank Mr. Chairman. Canada appreciates this opportunity to share.
Data Management Ethical considerations for educational research
6 Steps for Resolving Conflicts
What is a Debate? an argument with rules
Ensuring the data you have collected is properly verified is vital
Indirectness in Bad News Messages
Discipline – Fact or Myth?
“Seven-minute Staff Meeting”
Alison Foxa, Jim Askhamb and Rachel Tunstallb,
CARL Guide to Author Rights
USING SECONDARY DATA IN EDUCATIONAL RESEARCH
How to Successfully Peer Review
Student Access Decision Maker
Levels of involvement Consultation Collaboration User control
Presentation transcript:

Sharing can happen on different levels; within an organisation, within a closed but controlled set of actors, or - the point of no return - freely shared online. What are the pros, cons and considerations for each of these three groups? An important aspect of this level of sharing is the presence of an organisational security policy: a set of rules and guidelines providing you with a framework that you can safely assume your colleagues, partners or co-workers, will follow when dealing with the data. sharing your data with unusual suspects will provide you with opinions that are outside of the echo chamber you are used to, and can help to expand the dimensions of your project. You could, for example, share the data back with the people reflected in the data, and see what they think of what it reveals. Often, doing this is a responsible thing to do anyway. Once the data set is shared publicly, the proverbial cat is out of the bag. Any weak point in the information, any personally identifiable information that hasn't been properly addressed, will be impossible to mitigate because someone might have already made a copy. The sections above offer a strong validation and checkup process; however, a final risk assessment of the data is more than warranted.

If you decide to share it online, there are a number of further things to consider; do you want it to be **open** or **closed**? Chances are that if the data is suitable to be online, it's suitable to be used by others - but this isn't always the case. If you want to make your data **open** you can: give your data an **open** license make it fit within the **open definition** publish it to the internationally-recognised transparency standard, the International Aid Transparency Initiative.

Being 'open by default' might be useful in some situations, but when working with sensitive data, it's better to err on the side of prudence before making absolutely sure that no sensitive or potentially harmful data is being released into the open. The issue of **data ownership** is a tricky one; to whom does the data belong? Those who are represented in the data, or those who have collected the data? There's no easy answer to this question, so thinking it through carefully on a project-by-project basis is necessary to make sure you come to an appropriate answer. If you do decide to share it, making sure it has an appropriate license which represents well what you want the data to be used for can help clear up any uncertainties or potential misuses of the data. If you're sharing it with a specific group of actors, a legal or contractual framework might help to clearly outline what the data can and can't be used for by other parties.

Before publishing though, you might want to make sure that individuals are taken out of the data - but this isn't always so easy. A section discussing **anonymisation** - and various strategies for **de-identification** of data are included next. Anonymisation and identification is a particularly difficult responsible data issue, as 'perfect' anonymisation is difficult if not impossible. Releasing personally-identifiable information can be harmful to the people to whom the data pertains, but it can also be hard to remove and make sure that at no point in the future it will be re-attributable. If you're particularly worried about identification of your data before publishing, it might be most useful to simply get help from those with more experience in anonymization and de-identification.

No data is neutral, and normally when you present data you want to convey a specific narrative. Doing this in a way that doesn't skew the data or misrepresent the topics in question is important not just for the reputation of your organisation, but also as an ethical responsibility to the people who are reflected in the data itself. Diving into the details around ethically and responsibly visualising data lies way beyond the scope of this book. For more on this topic, we suggest referring to the accompanying suggested resources.