Recommendation 4.
Managing the risk of re-identifying the data – rules for what is shared

A person thinking. Two thought bubbles: one with a thumbs up and another with a thumbs down.

The policy about de-identifying data and keeping information private should:

Silouettes of people and a question mark.

  • look at things that can go wrong and how to fix them
  • make sure that people cannot be known from the information in the data asset.

A person holding a magnifying glass. A laptop with 'Data' written on the screen.

This means that before data from a project leaves a safe computer system it is checked to make sure people cannot be re-identified.

Response

The Australian Coat of Arms. A map of Australia and a handshake. A green tick.

We agree.

A policy document with a green tick.

We will write two documents called:

  • the De-identification Strategy
  • the Data Access, Use and Release Protocol.

Managing the data in line with these documents will help keep information about people safe.

A calendar that says, 'June 2024'.

This should be done by June 2024.