IDEAS home Printed from https://ideas.repec.org/p/uwe/wpaper/20161601.html
   My bibliography  Save this paper

Five Safes: designing data access for research

Author

Listed:
  • Tanvi Desai

    (University of Essex)

  • Felix Ritchie

    (University of the West of England, Bristol)

  • Richard Welpton

    (University of the West of England, Bristol)

Abstract

What is the best way of managing access to sensitive data? This is not a straightforward question, as it involves the interaction of legal, technical, statistical and, above all, human components to produce a solution. This paper introduces a modelling tool designed to simplify and structure such decision-making. The Five Safes model is a popular framework for designing, describing and evaluating access systems for data, used by data providers, data users, and regulators. The model integrates analysis of opportunities, constraints, costs and benefits of different approaches, taking account of the level of data anonymisation, the likely users, the scope for training, the environment through which data are accessed, and the statistical outputs derived from data use. Up to now this model has largely been described indirectly in other papers which have used it as a framing device. This paper focuses specifically on the framework, discusses usage, and demonstrates where it sits with other data and risk management tools. The aim is to provide a practical guide to the effective planning and management of access to research data.

Suggested Citation

  • Tanvi Desai & Felix Ritchie & Richard Welpton, 2016. "Five Safes: designing data access for research," Working Papers 20161601, Department of Accounting, Economics and Finance, Bristol Business School, University of the West of England, Bristol.
  • Handle: RePEc:uwe:wpaper:20161601
    as

    Download full text from publisher

    File URL: http://www2.uwe.ac.uk/faculties/BBS/Documents/1601.pdf
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Hans-Peter Hafner & Felix Ritchie & Rainer Lenz, 2015. "User-focused threat identification for anonymised microdata," Working Papers 20151503, Department of Accounting, Economics and Finance, Bristol Business School, University of the West of England, Bristol.
    2. Felix Ritchie & Mark Elliot, 2015. "Principles- versus rules-based output statistical disclosure control in remote access environments," Working Papers 20151501, Department of Accounting, Economics and Finance, Bristol Business School, University of the West of England, Bristol.
    3. Ritchie Felix, 2014. "Access to Sensitive Data: Satisfying Objectives Rather than Constraints," Journal of Official Statistics, Sciendo, vol. 30(3), pages 533-545, September.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Peng Zhang & Maged N. Kamel Boulos, 2022. "Privacy-by-Design Environments for Large-Scale Health Research and Federated Learning from Data," IJERPH, MDPI, vol. 19(19), pages 1-13, September.
    2. David H. Schiller & Johanna Eberle & Daniel Fuß & Jan Goebel & Jörg Heining & Tatjana Mika & Dana Müller & Frank Röder & Michael Stegmann & Karsten Stephan, 2017. "Standards des sicheren Datenzugangs in den Sozial- und Wirtschaftswissenschaften - Überblick über verschiedene Remote-Access-Verfahren," RatSWD Working Papers 261, German Data Forum (RatSWD).
    3. Sallie-Anne Pearson & Nicole Pratt & Juliana de Oliveira Costa & Helga Zoega & Tracey-Lea Laba & Christopher Etherton-Beer & Frank M. Sanfilippo & Alice Morgan & Lisa Kalisch Ellett & Claudia Bruno & , 2021. "Generating Real-World Evidence on the Quality Use, Benefits and Safety of Medicines in Australia: History, Challenges and a Roadmap for the Future," IJERPH, MDPI, vol. 18(24), pages 1-20, December.
    4. Kalinda E. Griffiths & Jessica Blain & Claire M. Vajdic & Louisa Jorm, 2021. "Indigenous and Tribal Peoples Data Governance in Health Research: A Systematic Review," IJERPH, MDPI, vol. 18(19), pages 1-22, September.
    5. Boylan, Sally & Arsenault, Catherine & Barreto, Marcos & Bozza, Fernando A & Fonseca, Adalton & Forde, Eoghan & Hookham, Lauren & Humphreys, Georgina S & Ichihara, Maria Yury & Le doare, Kirsty & Liu,, 2024. "Data challenges for international health emergencies: lessons learned from ten international COVID-19 driver projects," LSE Research Online Documents on Economics 122811, London School of Economics and Political Science, LSE Library.
    6. Ian Foster, 2018. "Research Infrastructure for the Safe Analysis of Sensitive Data," The ANNALS of the American Academy of Political and Social Science, , vol. 675(1), pages 102-120, January.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Ritchie, Felix, 2017. "Spontaneous recognition: an unnecessary control on data access?," Statistics Paper Series 24, European Central Bank.
    2. Talei Parker, 2017. "The DataLab of the Australian Bureau of Statistics," Australian Economic Review, The University of Melbourne, Melbourne Institute of Applied Economic and Social Research, vol. 50(4), pages 478-483, December.
    3. Felix Ritchie, 2014. "Resistance to change in government: risk, inertia and incentives," Working Papers 20141412, Department of Accounting, Economics and Finance, Bristol Business School, University of the West of England, Bristol.
    4. Felix Ritchie & Jim Smith, 2019. "Confidentiality and linked data," Papers 1907.06465, arXiv.org.
    5. Rainer Lenz, 2016. "Recent advances in cyclic perturbation of frequency tables [Neue Entwicklungen in der zyklischen Überlagerung von Fallzahltabellen]," AStA Wirtschafts- und Sozialstatistisches Archiv, Springer;Deutsche Statistische Gesellschaft - German Statistical Society, vol. 10(1), pages 37-62, February.
    6. Rainer Lenz, 2016. "Recent advances in cyclic perturbation of frequency tables," AStA Wirtschafts- und Sozialstatistisches Archiv, Springer;Deutsche Statistische Gesellschaft - German Statistical Society, vol. 10(1), pages 37-62, February.

    More about this item

    Keywords

    data access; data management; confidentiality; security engineering; statistical disclosure control;
    All these keywords.

    JEL classification:

    • C81 - Mathematical and Quantitative Methods - - Data Collection and Data Estimation Methodology; Computer Programs - - - Methodology for Collecting, Estimating, and Organizing Microeconomic Data; Data Access

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:uwe:wpaper:20161601. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Jo Michell (email available below). General contact details of provider: https://edirc.repec.org/data/seuweuk.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.