ANONYMISATION Research Data Management. c Research Data Management Sensitive Data Sensitive Data is information covering: The racial or ethnic origin.

Slides:



Advertisements
Similar presentations
NIGB NATIONAL INFORMATION GOVERNANCE BOARD FOR HEALTH AND SOCIAL CARE.
Advertisements

Open Access: Data Protection, Storage and Sharing Caroline Dominey.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi David Cauchi Office of the Commissioner for Data Protection.
Data Protection: Health. Data Protection & Health Data Data on physical or mental health or condition or sexual life are ‘sensitive personal data’ with.
The Data Protection Act - an absolute right to ask but a qualified right to receive Maureen H Falconer Senior Policy Officer, ICO CELCIS, Scottish University.
Understanding Research Ethics Dr Meera Warrier Research Development Coordinator Academic Practice
The Data Protection (Jersey) Law 2005.
Data Protection.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi Office of the Data Protection Commissioner.
Use of Children as Research Subjects What information should be provided for an FP7 ethical review?
ILONA GAVRONSKA GROUP IL-41 INTERNATIONAL LAW DEPARTMENT KYIV NATIONAL ACADEMY OF SCIENCES OF UKRAINE KYIV UNIVERSITY OF LAW.
INTERNET and CODE OF CONDUCT
Data Protection Overview
Data Protection for Church of Scotland Congregations
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Dealing with confidential research information and consent agreements in research Louise Corti Associate Director UK Data Archive University of Glamorgan.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
1 When hate speech tangles privacy... When hate speech tangles privacy...
Data Protection and You Your Rights & The Law Registration Basics Other Activities Disclaimer: This presentation only provides an introductory info. Please.
The Audit Process Tahera Chaudry March Clinical audit A quality improvement process that seeks to improve patient care and outcomes through systematic.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
Managing Risks Associated With Privacy Alison Baker- Senior Associate Hall & Wilcox 24 November
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection: An enabler? David Freeland, Senior Policy Officer 23 October 2014.
Data Protection Act & Freedom of Information Simon Mansell Corporate Governance and Information Team.
Human Subjects Protections Research Ethics. Basic Assumptions about How Research Should be Conducted Subjects should be protected from harm. Subjects.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Regulation of Personal Information Sally Brierley & Emma Harvey.
OPEN UP! Introduction to handling Freedom of Information requests.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
Data Protection for Church of Scotland Congregations.
1 Ethical issues in genomics research Bernard Lo, M.D. March 3, 2009.
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
Learning outcomes Understand the importance of diversity, equality and inclusion. 2. Know how to work in an inclusive way 3. Know how to access information,
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
The Protection of Personal Information Bill 13 February
HETUS Pilot Group 8 Privacy procedures and ethical issues Kimberly Fisher, Centre for Time Use Research – co-ordinator External consultant Kai Ludwigs.
DATA PROTECTION ACT (DPA). WHAT IS THE DATA PROTECTION ACT?  The Data Protection Act The Data Protection Act (DPA) gives individuals the right.
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Sharing Information Legally Lindsay Ould London Borough of Lewisham.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Understanding Privacy An Overview of our Responsibilities.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
Understanding Privacy An Overview of our Responsibilities.
Students’ Unions 2011 Data Protection and Students’ Unions Mairead O’Reilly 19 July 2011.
REFLECT: Recovery Following Intensive Care Treatment
Data Protection GCSE ICT Mrs N Steventon-2005.
Data Protection and Confidentiality
ECS SEC Lester Gilbert Learning Societies Lab
IT Applications Theory Slideshows
Data Protection Act 1988 and Data Protection (Amendment) Act 2003
Research Ethics Matthew Billington
Data Protection & Freedom of Information- An Introduction
GENERAL DATA PROTECTION REGULATION (GDPR)
New Data Protection Legislation
ScHARR Bite Size Research Ethics and GDPR: legal requirements for research - what you need to know.

Data Protection principles
Data Protection and You
D3 Confidentiality.
Data Protection Act 1988 and Data Protection (Amendment) Act 2003
Data Management Ethical considerations for educational research
GDPR – General Data Protection Regulation
Understanding Data Protection
Data Protection for SDS Employers Alison Johnston Lead Policy Officer (Scotland) Information Commissioner’s Office.
ScHARR Bite Size Research Ethics and GDPR: legal requirements for research - what you need to know.
Presentation transcript:

ANONYMISATION Research Data Management

c Research Data Management Sensitive Data Sensitive Data is information covering: The racial or ethnic origin of the Data Subject Political opinions Religious or other beliefs of a similar nature Membership of trade unions Physical or mental health or condition Sexual Life The commission of any offence or criminal records Sensitive data must be collected using an opt-in and should be carefully handled. Other classes of data which might be regarded as sensitive are data relating to children and financial information, and also data related to national defence. Sensitive data also includes any information that is protected by University policy from unauthorized access. This information must be restricted to those with a legitimate business need for access. Finishing Touches of Research Data Management

c Research Data Management Personal and Confidential Information (PCi) Personal data Personal data are data which relate to a living individual who can be identified from those data or from those data and other information which is in the possession of, or is likely to come into the possession of, the data controller and includes any expression of opinion about the individual and any indication of the intentions of the data controller. This includes any other person in respect of the individual (Data Protection Act 1998). Confidential data Confidential data are data given in confidence or data agreed to be kept confidential, i.e. secret, between two parties, that are not in the public domain such as information on business, income, health, medical details, and political opinion. The University UPR12 sets out the acceptable practice for managing PCi. Finishing Touches of Research Data Management

c Research Data Management Anonymisation A person's identity can be disclosed from: direct identifiers such as names, addresses, postcode information, telephone numbers or pictures indirect identifiers which, when linked with other publicly available information sources, could identify someone, e.g. information on workplace, occupation or exceptional values of characteristics like salary or age Direct identifiers are often collected as part of the research administration process but are usually not essential research information and can therefore easily be removed from the data. UK Data Archive Finishing Touches of Research Data Management

c Research Data Management Anonymisation Assign each participant an anonymity code, which would be their identifier in a SPSS or Excel database. Only the PI can match an individual to their code and each participant can be given their own code in case they wish to withdraw from the study. Most data are used en masse so individuals are difficult to identify, it is the grouped responses that researchers are interested in. When publishing the data, information that identifies participants cannot be published such as name, address, telephone and contact information. Apply this same anonymisation to the data sets, what doesn’t need to be shared? You can ask the participants for permission to publish certain disclosed information when you’re ready to archive it if you did not do so when it was collected. Finishing Touches of Research Data Management

c Research Data Management Ethics approved sharing Your sensitive data is most at risk when you share it between devices and people. If you are working with the NHS, you will be provided with an encrypted account that you need to use to contact them. In your everyday environment, you can; encrypt your s using Outlook; this also encrypts the attachments but you will need ensure the recipient can decrypt it. encrypt your data and files using TrueCrypt before attaching them to your or using the file exchange. Finishing Touches of Research Data Management

c Research Data Management Open Access with restrictions The term "Open Data" is unsettling and can have different connotations depending on who you talk to. Generally, it means that data is accessible by everyone. With respect to repositories, it is unreasonable and unlikely that all data is available without restrictions. If data is discoverable, then it is open to the public and accessible. It may not be downloadable by everyone You can restrict access to professionals, members of a particular group i.e. NHS workers. Archives will offer different levels of access so your data is protected against misuse. Finishing Touches of Research Data Management

c Research Data Management NHS Data archives Sensitive data has to be anonymised before being preserved in an archive; however, this is not a new concept as data must be anonymised for publication. Databases with sensitive information tend to have access control so that data is not misused. The National Institute of Health and Care Excellence (NICE), provide an evidence search which is accessed using NHS Athens. The University of Hertfordshire is a member of Athens, so if you are supporting NHS patients, you can get a NHS Athens account for free. NHS approved databases are reviewed by their ethics committee and meet their requirements for the preservation of research data. Finishing Touches of Research Data Management