Download presentation
Presentation is loading. Please wait.
Published byJune Ball Modified over 9 years ago
1
Capturing Sensitive Data & Data Linkage
2
Capturing Sensitive Data Data Protection Act 1998 (Section 33) – Allows data to be used for research purposes The Information Commissioner - data collected for National Statistics and educational research can include identifiable items.
3
Capturing Sensitive Data Maximise the quality and value of information gained from single sources Enhance user’s understanding of statistical information Efficient collection of data (value for money) Provide opportunities for the cross-analysis, exchange and re-use of data
4
Data Linkage Project
5
Existing Data Linkage School Leaver Destinations – Destination of leavers from publicly funded schools (Careers Scotland) Pupil characteristics taken from the September Pupil Census
6
Data Linkage Project Aims Maximise the value of available administrative data and system Relate significant events that are remote from one another in time or location Facilitate the widespread and safe use of matched education data To establish as quickly, cheaply and accurately as possible which education related records belong to the same individual.
7
Investigate the data collected (quality and consistency) Design/redesign administrative systems to allow integration and data sharing. Standard definitions, names and codes Standard geographies National (and international) standards
8
Matching Techniques…... Exact matching leads to inexact results e.g. requiring exact match on SCN, date of birth, sex - expect at least 10-15% errors because of discrepancies Probability matching more accurate Quantifies the implications of levels of agreement and disagreement 2% true links missed
9
Development of the linkage methodology Why use Probability Matching ?
10
Areas for consideration Data Investigation and Data Cleaning Bring together the pairs of records to be compared (‘Blocking’) Linkage methodology Reporting and Refinement Anonymisation
11
Data Protection, Confidentiality and Security Access to person identifiable data Defined procedures for the secure handling of sensitive data Organisational protocols Access & storage Formal application Impose Conditions (anonymisation)
12
Project Summary Proof of concept Data available for linkage Linkage methodology Conclusions and results
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.