PILOT logo, post doc PILOT logo, information PILOT logo, literacy PILOT logo, online PILOT logo, tutorial welcome information contents page search and retrieve contents page acquiring and managing information contents page new technologies contents page
digital footprint contents page
copyright contents page IL pilot license contents page databases contents page publication process contents page
Welcome


Data protection, rights and access: Anonymise it!

One of the ways to avoid falling foul of the Data Protection Act is to work with and share anonymised, rather than 'raw' data. You can find anonymisation techniques in the Anonymisation Code of Practice, Appendix 2 (November, 2012) from the Information Commissioner's Office.

Ellie Bates, PhD student at the University of Edinburgh, talks about how to deal with data that contains sensitive personal information. Ellie was a 3rd year PhD student. Her PhD title was: "Exploring the place and time dynamics of vandalism". She was looking at comparing high level and low level areas of vandalism by means of analysing sensitive personal crime data obtained from the police and focus groups with community police.
The data described is sensitive personal information not only because it contains information about criminals and victims but because it contains locations of crimes.
To view the video with captions click on the watermark of the video. You may need to turn the captions on using the icon along the bottom of the video. A transcript of this video is also available. Can't see the video? You can either watch it on the YouTube website, or adjust your browser settings.

 

GCU logofont +  |   font -  |   Nextsmall plane | small plane Back |  unit home small plane

Creative Commons Licence
PILOT - Writing a data management plan by Edina, University of Edinburgh modified by Marion Kelt, GCU is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at http://datalib.edina.ac.uk/mantra/introduction.html