|
{salutation} Data should be as open as possible, but as restricted as necessary. So how can we share data that contains sensitive information? There are numerous ways to transform data to protect sensitive information but it all depends on: - the form and content of the data itself
- the vulnerability of who or what you are protecting
- who will have access to the data
Below are some suggested methods and resources to get help. *Note: Every project is different. Thus, it's always a good idea to consult a privacy expert. |
|
|
|
Transformation Methods: - De-Identification: Removing or altering identifiers but retaining the ability to reconnect with and re-identify the data by using a code, algorithm, or pseudonym.
- Anonymization: Removing or altering all possible identifiable information so that the data can never be re-identified.
- Aggregation: Replacing specific identifying information with a more general summarized form.
|
Illinois Data Security Resources: - Privacy Office: Guidance, resources, and consultative services on privacy policy and concerns.
- Research IT Consulting: Help finding the right IT resources to fit your security needs.
- REDCap: Survey tool for collecting high-risk (and non-high-risk) data.
- Data Transfer and Use Agreements: Guidance for UIUC investigators who want to share restricted data with or receive restricted data from outside parties.
|
September 2023 |
|
|
|