Five Safes: Designing data access for research

Research English OPEN
Desai, T. ; Ritchie, F. ; Welpton, R. (2016)
  • Publisher: University of the West of England

What is the best way of managing access to sensitive data? This is not a straightforward question, as it involves the interaction of legal, technical, statistical and, above all, human components to produce a solution. This paper introduces a modelling tool designed to simplify and structure such decision-making.\ud The Five Safes model is a popular framework for designing, describing and evaluating access systems for data, used by data providers, data users, and regulators. The model integrates analysis of opportunities, constraints, costs and benefits of different approaches, taking account of the level of data anonymisation, the likely users, the scope for training, the environment through which data are accessed, and the statistical outputs derived from data use.\ud Up to now this model has largely been described indirectly in other papers which have used it as a framing device. This paper focuses specifically on the framework, discusses usage, and demonstrates where it sits with other data and risk management tools. The aim is to provide a practical guide to the effective planning and management of access to research data.
  • References (17)
    17 references, page 1 of 2

    ASA (2009) Statistical disclosure limitation: balancing data confidentiality and data access. Accessed 13.8.2014. http://slideplayer.us/slide/709029/

    Bailey M. (2012) “Workshop on security at the Cyberborder”, Security at the Cyberborder Workshop Report, Summaries pp56-60 https://scholarworks.iu.edu/dspace/bitstream/handle/2022/14070/Cyberborder-ReportFinal.pdf

    Brandt M. (2010) Decentralised Access to EU-Microdata Sets, final report to Eurostat on grant agreement no. 61102.2008.001-2008.828, Eurostat, 2010. http://www.crosportal.eu/sites/default/files//Final%20report%20DA.pdf

    Brandt M., Franconi L., Guerke C., Hundepool A., Lucarelli M. , Mol J., Ritchie F., Seri G. and Welpton R. (2010) Guidelines for the checking of output based on microdata research, Final report of ESSnet sub-group on output SDC, Eurostat http://neon.vb.cbs.nl/casc/ESSnet/guidelines_on_outputchecking.pdf

    Bujnowska A. and Museux J-M. (2012) “The Future of Access to European Confidential Data for Scientific Purposes”, Work session on Statistical Data Confidentiality 2011, Eurostat. http://www.unece.org/fileadmin/DAM/stats/documents/ece/ces/ge.46/2011/43_Eurostat. pdf

    Camden M. (2014) "Confidentiality for integrated data” in Work session on statistical data confidentiality 2013; Eurostat. http://www.unece.org/fileadmin/DAM/stats/documents/ece/ces/ge.46/2013/Topic_3_NZ.p df

    Corti L., van den Eyden V., Bishop L., and Woollard M. (2014) Managing and sharing research data: a guide to good practice. London: Sage Publications Ltd

    Desai T. (2012) “Maximising Returns to Government Investment in Data”, presentation to IASSIST 2012, Vancouver. http://www.iassistdata.org/downloads/2012/2012_f2_desai.pdf

    Desai T. and Ritchie F. (2010) "Effective researcher management", in Work session on statistical data confidentiality 2009; Eurostat. http://www.unece.org/stats/documents/ece/ces/ge.46/2009/wp.15.e.pdf

    Eurostat (2014) Treatment of Statistical Confidentiality: Introductory module. Course notes. Eurostat.

  • Similar Research Results (1)
  • Metrics
    0
    views in OpenAIRE
    0
    views in local repository
    435
    downloads in local repository

    The information is available from the following content providers:

    From Number Of Views Number Of Downloads
    UWE Research Repository - IRUS-UK 0 435
Share - Bookmark