5.4 Excercise

Let’s do a Risk Value Assessment based on what you learned in today’s session. For those of you who have not done ​ session 2  – “Risk Associated to data processing”​, please open this template process map, which is the first and second part of the “Risk Value Analysis”. If you have a printer at hand, print it out, otherwise just use it on your computer. Start with the part one, by thinking about a potential data set you are or you have processed as part of your projects. Go through the assessment of if there is high risk associated to the data set. After conducting this first exercise, continue with the next paragraph.

For those of you who have done ​ session 2 – “Risk Associated to data processing”​, open this file which is the second part of the “Risk Value Analysis”. If you have a printer at hand, print it out, otherwise just use it on your computer.

Review the page of the Risk / Value analysis. You have now learned about anomyzation technics and the protection they offer but also the potential risks associated to them. Think about your data set and try to understand the data situation. The following question might help you:

  • Is the data situation static or not?
  • What is the environment?
  • Will it change? I.e. will you share data with other parties?
  • Where is your data? I.e. is it open or not?
  • Is the data about people?
  • Is it about a vulnerable population?
  • Information that could put the individuals at risk?
  • What other data sets are out there that could be linked to this data set?
  • How much would someone else need to know to identify an individual in the data set?

Based on this assessment, fill out the second part of the risk value assessment.

Find out more about Privacy Impact Assessment

If you want to learn more about de-identification have a look at these ressource: