‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌   ‌
 
View this email in your browser
 
 
 

{salutation}

Data should be as open as possible, but as restricted as necessary. So how can we share data that contains sensitive information? There are numerous ways to transform data to protect sensitive information but it all depends on: 

  • the form and content of the data itself
  • the vulnerability of who or what you are protecting
  • who will have access to the data

Below are some suggested methods and resources to get help. 
*Note: Every project is different. Thus, it's always a good idea to consult a privacy expert

 
 

Transformation Methods:

  • De-Identification: Removing or altering identifiers but retaining the ability to reconnect with and re-identify the data by using a code, algorithm, or pseudonym.
  • Anonymization: Removing or altering all possible identifiable information so that the data can never be re-identified.
  • Aggregation: Replacing specific identifying information with a more general summarized form.

 
Illinois Data Security Resources:

  • Privacy Office: Guidance, resources, and consultative services on privacy policy and concerns.
  • Research IT Consulting: Help finding the right IT resources to fit your security needs.
  • REDCap: Survey tool for collecting high-risk (and non-high-risk) data.
  • Data Transfer and Use Agreements: Guidance for UIUC investigators who want to share restricted data with or receive restricted data from outside parties.

September 2023

 
     
 

☆☆☆ Browse Other Nudges ☆☆☆

 
     
 

Have you been nudged into action by the Data Nudge?
Tell us about it using this feedback form and we'll send you a
Research Data Service gift bag!