This guide provides a framework to understand the level of risk inherent in any SMS-based activity, given the vulnerabilities and threats that may arise when using FrontlineSMS.
Identity, anonymity & privacy
Data can have real consequences for real people, and often these consequences are as unintended as they are harmful. This is regularly the case when Personally Identifiable Information (PII) is published, or when seemingly innocuous data is mashed and collated with other datasets. These resources provide strategies and tools for protecting identity, providing anonymity and respecting privacy.
As part of Brookings’ Issues in Technology Innovation series, Cameron F Kerry, Yves-Alexandre de Montjoye and Jake Kendall published a paper arguing for a more nuanced approach in protecting privacy related to mobile data, and building a case for special exceptions where data may be used for significant public good or to avoid serious harm to people.
J. Nathan Mathias at the MIT Symposium on Gender and Technology has prepared a practical guide to methods of identifying gender in large datasets and the ethical considerations that accompany them.
Patrick Meier and his research team at the Humanitarian UAV Network have compiled a list of fears and concerns expressed by humanitarians and others on the use of UAVs in humanitarian settings.
The Big Boulder Initiative, a non-profit organisation that seeks to establish standards for social media companies, has recently published a Code of Ethics & Standards, which it describes as ‘a starting point for articulating and honoring the most ethical business practices surrounding social data and its use for organisations.’
Data & Society is looking to assemble its 2015 class of fellows. The fellowship program brings together a network of researchers, entrepreneurs, activists, policy creators, journalists, geeks, and public intellectuals, who would have partial residence in Manhattan.
Ushahidi’s Zack Halloran has written a blog calling all ‘Privacy Wonks, Process Experts, Computational Linguists, Data Detectives, M&E Pros, Veteran Activists and Hackers of all stripes’ to work together to protect data owners’ privacy rights and safety.
A project design tool for assessing potential harms associated with specific data points.
This book, organized around the data lifecycle, highlights responsible data concerns, recommendations, and real-world examples in the context of international development programming.
This framework helps you identify what data should be de-identified, and how to do it.