Five safes

From HandWiki
Short description: Decision-making framework

The Five Safes is a framework for helping make decisions about making effective use of data which is confidential or sensitive. It is mainly used to describe or design research access to statistical data held by government agencies, and by data archives such as the UK Data Service.[1]

Two of the Five Safes refer to statistical disclosure control, and so the Five Safes is usually used to contrast statistical and non-statistical controls when comparing data management options.

Concept

The Five Safes proposes that data management decisions be considered as solving problems in five 'dimensions': projects, people, settings, data and outputs. The combination of the controls leads to 'safe use'. These are most commonly expressed as questions, for example:[2][3]

Safe projects Is this use of the data appropriate?
Safe people Can the users be trusted to use it in an appropriate manner?
Safe settings Does the access facility limit unauthorised use?
Safe data Is there a disclosure risk in the data itself?
Safe outputs Are the statistical results non-disclosive?

These dimensions are scales, not limits. That is, solutions can have a mix of more or fewer controls in each dimension, but the overall aim of 'safe use' independent of the particular mix. For example, a public use file available for open download cannot control who uses it, where or for what purpose, and so all the control (protection) must be in the data itself. In contrast, a file which is only accessed through a secure environment with certified users can contain very sensitive information: the non-statistical controls allow the data to be 'unsafe'. One academic likened the process to a graphic equalizer,[4] where bass and treble can be combined independently to produce a sound the listener likes.

There is no 'order' to the Five Safes, in that one is necessarily more important than the others. However, Ritchie[5] argued that the 'managerial' controls (projects, people, setting) should be addressed before the 'statistical' controls (data, output).

The Five Safes concept is associated with other topics which developed from the same programme at ONS, although these are not necessarily implemented. Safe people is associated with 'active researcher management',[6] while safe outputs is linked with principles-based output statistical disclosure control.

The Five Safes is a positive framework, describing what is and is not. The EDRU ('evidence-based, default-open, risk-managed, user-centred') attitudinal model[7] is sometimes used to give a normative context

The 'data access spectrum'

From 2003 the Five Safes was also represented in a simpler form as a 'Data Access Spectrum'[8].The non-data controls (project, people, setting, outputs) tend to work together, in that organisations often see these as a complementary set of restrictions on access. These can then be contrasted with choices about data anonymisation to present a linear representation of data access options. This presentation is consistent with the idea of 'data as a residual',[5] as well as data protection laws of the time which often characterised data simply as anonymous or not anonymous.

A similar idea had already been developed independently in 2001 by Chuck Humphrey of the Canadian RDC network, the 'continuum of access'.[9] More recently, The Open Data Institute has developed a 'Data Spectrum toolkit'[10] which includes industry-specific examples.

History and terminology

The Five Safes was devised in the winter of 2002/2003 by Felix Ritchie at the UK Office for National Statistics (ONS) to describe its secure remote-access Virtual Microdata Laboratory (VML).[11] It was described at this time as the 'VML Security Model'. This was adopted by the NORC data enclave,[12] and more widely in the US, as the 'portfolio model' (although this is now also used to refer to a slightly different legal/statistical/educational breakdown).[13] In 2012 the framework as was still being referred to as the 'VML security model',[14] but its increasing use among non-UK organisations led to the adoption of the more general and informative phrase 'Five Safes'.[2]

The original framework only had four safes (projects, people, settings and outputs): the framework was used to describe highly detailed data access through a secure environment, and so the 'data' dimension was irrelevant. From 2007 onwards, 'safe data' was included as the framework was used to a describe a wider range of ONS activities. As the US version was based upon the 2005 specification, some US iterations uses have the original four dimensions (eg[12]).

Some discussions, such as the OECD,[15] use the term 'secure' instead 'safe'. However, the use of both these terms can cause presentational problems: less control in a particular dimension could be seen to imply 'unsafe users' or 'insecure settings', for example, which distracts from the main message. Hence, the Australian government uses the term "five data sharing principles".[16]

The 'Anonymisation Decision-Making Framework'[17] uses a framework based on the Five Safes but relabelling "projects", "people", and "settings" as "governance", "agency" and "infrastructure", respectively; "Output" is omitted, and "safe use" becomes "functional anonymisation". There is no reference to the Five Safes or any associated literature. The Australian version[18] was required to include references to the Five Safes, and presented it as an alternative without comment.

Application

The framework has had three uses: pedagogical, descriptive, and design. The latter is a relatively recent development.

Pedagogy

The first significant use of the framework, other than internal administrative use, was to structure researcher training courses at the UK Office for National Statistics from 2003. UK Data Archive, Administrative Data Research Network, Eurostat, Statistics New Zealand, the Mexican National Institute of Statistics and Geography, NORC, Statistics Canada and the Australian Bureau of Statistics, amongst others, have also used this framework. Most of these courses are for researchers using restricted-access facilities; the Eurostat courses[19] are unusual in that they are designed for all users of sensitive data.

Description

The framework is often used to describe existing data access solutions (e.g. UK HMRC Data Lab,[20] UK Data Service,[21] Statistics New Zealand[22]) or planned/conceptualised ones (e.g. Eurostat in 2011[23]). An early use[24] was to help identify areas where ONS' still had 'irreducible risks' in its provision of secure remote access.

The framework is mostly used for confidential social science data. To date it appears to have made little impact on medical research planning,[25] although it is now included in the revised guidelines on implementing HIPAA regulations[26] in the US, and by Cancer Research UK and the Health Foundation in the UK.[27] It has also been used to describe a security model for the Scottish Health Informatics Programme.[28]

Design

In general the Five Safes has been used to describe solutions post-factum, and to explain/justify choices made, but an increasing number of organisations have used the framework to design data access solutions. For example, the Hellenic Statistical Agency developed a data strategy built around the Five Safes in 2016; the UK Health Foundation used the Five Safes to design its data management and training programmes.[27] Use in the private sector is less common but some organisations have incorporated the Five Safes into consulting services.

The major design use is in Australia: both the Australian Bureau of Statistics and the Australian Department of Social Service used the Five Safes as an ex ante design tool.[3][7] In 2017 the Australian Productivity Commission recommended[29] adopting a version of the framework to support cross-government data sharing and re-use. This is currently undergoing consultation[16] with draft legislation expected in 2020.

In 2015 the UK Data Service organized a workshop[21] to encourage data users from the academic and private sectors to think about how to manage confidential research data, using the Five Safes to demonstrate alternative options and best practice.

Two laws have incorporated the Fives Safes: explicitly in the South Australian Public Sector (Data Sharing) Act 2016, implicitly in the research provisions of the Digital Economy Act.

Public engagement

The UK Data Service has produced a blog[30] and video[31] for the general public about the use of Five Safes in re-using administrative data. Statistics New Zealand produced a non-technical description,[32] as did ONS for Data Privacy Day 2017.[33] The Australian Federal Government has produced several videos on data sharing, including the Data Sharing Principles.[34]

References

  1. "What is the Five Safes framework?". UK Data Service. https://ukdataservice.ac.uk/help/secure-lab/what-is-the-five-safes-framework/. 
  2. 2.0 2.1 Desai, Tanvi; Ritchie, Felix; Welpton, Richard (2016). "Five Safes: designing data access for research". Bristol Business School Working Papers in Economics: Footnote 1. http://www2.uwe.ac.uk/faculties/BBS/Documents/1601.pdf. 
  3. 3.0 3.1 "1015.0 - Information Paper: Transforming Statistics for the Future". Australian Bureau of Statistics. 2016. http://www.abs.gov.au/AUSSTATS/abs@.nsf/be4aa82cd8cf7f07ca2570d60018da27/e4d483bab4e1ad93ca257f4c00170bb6!OpenDocument. 
  4. McEachern, Steve (2015). "Implementation of the Trusted Access Model". Australian Data Archive. http://rsss.anu.edu.au/sites/default/files/SMcEachern_researcherperspective_ASSANov2015.pdf. 
  5. 5.0 5.1 Ritchie, Felix (2017). The 'Five Safes': a framework for planning, designing and evaluating data access solutions. Data for Policy. https://zenodo.org/record/897821. 
  6. Desai, Tanvi; Ritchie, Felix (2009). "Effective Researcher Management". Eurostat. http://www.unece.org/stats/documents/ece/ces/ge.46/2009/wp.15.e.pdf. 
  7. 7.0 7.1 Green, Elizabeth; Ritchie, Felix (2016). "Department of Social Services data access project final report. Project Report". http://eprints.uwe.ac.uk/31874/. 
  8. Ritchie, Felix (2009). "Designing a national model for data access". Comparative Analysis of Enterprise (Micro)Data 2009. http://www.felixritchie.co.uk/publications/caed09v3.doc. 
  9. Humphrey, Charles (Chuck) (2001). "The Data Liberation Initiative Orientation Session". https://slideplayer.com/slide/13350197/. 
  10. "ODI Data Spectrum". https://theodi.org/about-the-odi/the-data-spectrum/. 
  11. Ritchie, Felix (2008). "Secure access to confidential microdata: four years of the Virtual Microdata Laboratory". Economic and Labour Market Statistics 2:5 (5): 29–34. doi:10.1057/elmr.2008.73. http://www.ons.gov.uk/ons/rel/elmr/economic-and-labour-market-review/no--5--may-2008/secure-access-to-confidential-microdata--four-years-of-the-virtual-microdata-laboratory.pdf. 
  12. 12.0 12.1 Lane, Julia; Bowie, Chet; Scheuren, Fritz; Mulcahy, Tim (2009). "NORC Data Enclave:Providing Secure Remote Access to Sensitive Microdata". UNECE/EU Workshop on Statistical Confidentiality 2009. http://ec.europa.eu/eurostat/documents/1001617/4398365/S02P1-NORC-DATA-ENCLAVE-SCHEUREN.ppt. 
  13. Lane, Julia; Heus, Pascal; Mulcahy, Tim (2008). "Data Access in a Cyber World: Making Use of Cyberinfrastructure". Transactions in Data Privacy: 2–16. 
  14. Felix, Ritchie (2013-01-01). "International access to restricted data: A principles-based standards approach" (in en). Statistical Journal of the IAOS 29 (4). doi:10.3233/sji-130780. ISSN 1874-7655. 
  15. Volkow, Natalia. "OECD Expert Group For International Collaboration On Microdata Access, Chapter 6. Standardised Application Process For Microdata Access". OECD. pp. 73–79. http://www.oecd.org/std/microdata-access-final-report-OECD-2014.pdf. 
  16. 16.0 16.1 Office of the National Data Commissioner (2019). "Data sharing and release: legislative reforms". https://www.datacommissioner.gov.au/sites/default/files/2019-09/Data%20Sharing%20and%20Release%20Legislative%20Reforms%20Discussion%20Paper%20-%20Accessibility.pdf. 
  17. Elliot, Mark; Mackey, Elaine; O'Hara, Kieran; Tudor, Caroline (2016). Anonymisation Decision-Making Framework. University of Manchester. https://ukanon.net/wp-content/uploads/2015/05/The-Anonymisation-Decision-making-Framework.pdf. 
  18. O'Keefe, Christine; Otorepec, Stephanie; Elliot, Mark; Mackay, Elaine; O'Hara, Kieran (2017). De-identification decision-making framework. CSIRO. https://doi.org/10.4225/08/59c169433efd4. 
  19. "Self-study material for the users of European microdatasets". European Commission. http://ec.europa.eu/eurostat/web/microdata/overview/self-study-material-for-microdata-users. 
  20. Hawkins, Mike (2011). "The HMRC Datalab". http://www.slideserve.com/stephen-hester/the-hmrc-datalab. 
  21. 21.0 21.1 "The 5 safes of access to confidential data". UK Data Service. https://www.ukdataservice.ac.uk/news-and-events/eventsitem/?id=4058. 
  22. Camden, Mike (2011). "Confidentiality for integrated data". Eurostat. http://www.unece.org/fileadmin/DAM/stats/documents/ece/ces/ge.46/2013/Topic_3_NZ.pdf. 
  23. Bujnowska, Aleksandra; Museux, Jean-Marc (2011). "The Future of Access to European Confidential Data for Scientific Purposes". Eurostat. http://www.unece.org/fileadmin/DAM/stats/documents/ece/ces/ge.46/2011/43_Eurostat.pdf. 
  24. Ritchie, Felix (2005). "Access to business microdata in the UK: dealing with the irreducible risks". UNECE/Eurostat Workshop on Statistical Data Confidentiality 2005. http://www.unece.org/fileadmin/DAM/stats/documents/ece/ces/ge.46/2005/wp.29.e.pdf. 
  25. Green, Elizabeth (2015). et al. "Enabling data linkage to maximise the value of public health research data". Public Health Research Data Forum Commissioned Reports (Wellcome Trust). http://www.wellcome.ac.uk/stellent/groups/corporatesite/@policy_communications/documents/web_document/wtp059017.pdf. 
  26. Council, National Research (2014-01-09) (in en). Proposed Revisions to the Common Rule for the Protection of Human Subjects in the Behavioral and Social Sciences. doi:10.17226/18614. ISBN 9780309298063. http://www.nap.edu/catalog.php?record_id=18614. 
  27. 27.0 27.1 Wolters, Arne (2015). "Governance and the HSCIC's IG toolkit". https://ukdataservice.ac.uk/media/604145/19_5safes_safesettings_wolters.pdf. 
  28. Sullivan, Frank. "The Scottish Health Informatics Programme". http://www.rss.org.uk/uploadedfiles/userfiles/files/Frank-Sullivan-linkage.ppt. 
  29. Data Availability and Use: Australian Productivity Commission Inquiry Report. Productivity Commission. 2017. ISBN 978-1-74037-617-4. https://www.pc.gov.au/inquiries/completed/data-access/report. 
  30. Welpton, Richard; Corti, Louise. "Access to sensitive data for research: the five safes". http://blog.ukdataservice.ac.uk/access-to-sensitive-data-for-research-the-5-safes/. 
  31. "Five Safes video". UK Data Service. https://www.youtube.com/embed/Mln9T52mwj0. 
  32. "How we keep IDI data safe". http://www.stats.govt.nz/browse_for_stats/snapshots-of-nz/integrated-data-infrastructure/keep-data-safe.aspx. 
  33. Stokes, Pete (2017). "The Five Safes: data privacy at ONS". Office for National Statistics. https://blog.ons.gov.uk/2017/01/27/the-five-safes-data-privacy-at-ons/. 
  34. Office of the National Data Commissioner (2019). "Sharing data safely". https://www.datacommissioner.gov.au/safeguards/sharing-data-safely. 

External links