Practical Insights on Data Privacy

Who Owns the Data in Global Public Health Programming?

Who Owns the Data in Global Public Health Programming?

Published on: Apr 20 2022 by Guest Writer - 7 Comments
A couple of years ago I attended the Global Digital Health Forum, where a speaker by the name of Jeff Street said something that has stuck with me ever since: “Whoever...
Facebook Data Privacy Concepts Do Not Translate in Cambodia

Facebook Data Privacy Concepts Do Not Translate in Cambodia

Published on: Mar 31 2022 by Guest Writer - Comments Off on Facebook Data Privacy Concepts Do Not Translate in Cambodia
Privacy scholarship has shown how norms of appropriate information flow and information regulatory processes vary according to environment, which change as the...
ICRC Cyber Attack is Our Constituent Data Management Nightmare

ICRC Cyber Attack is Our Constituent Data Management Nightmare

Published on: Jan 26 2022 by Wayan Vota - 1 Comment
A sophisticated cyber security attack against International Committee of the Red Cross (ICRC) servers last week exposed sensitive personally identifiable information...
5 Ways We Get Survey Participants To Opt Out of Data Collection

5 Ways We Get Survey Participants To Opt Out of Data Collection

Published on: Oct 28 2021 by Guest Writer - Comments Off on 5 Ways We Get Survey Participants To Opt Out of Data Collection
Over the years, we’ve found that one specific area of the research life cycle – informed consent – needs serious improvement. The consent process...
What Digital Technology Systems Are Procured by African Governments?

What Digital Technology Systems Are Procured by African Governments?

Published on: Oct 14 2021 by Guest Writer - 1 Comment
What does the public know about transparency and safeguards in the procurement and deployment of Digital Technology Systems in Africa, including biometric identification,...
12 Ways to Manage Digital Risks to Refugee Community Connectivity

12 Ways to Manage Digital Risks to Refugee Community Connectivity

Published on: Oct 06 2021 by Guest Writer - Comments Off on 12 Ways to Manage Digital Risks to Refugee Community Connectivity
Connectivity initiatives, which entail the provision of internet and mobile access, can positively impact the lives of crisis-affected people, especially refugees,...
We Need Strong Information Security Practices in Afghanistan Right Now

We Need Strong Information Security Practices in Afghanistan Right Now

Published on: Aug 20 2021 by Mike Dawson - 3 Comments
The situation in Afghanistan is heartbreaking for everyone. Those who are there, those with family there, and those with friends, colleagues, and care for our fellow...
UNICEF 10 Point Children’s Data Governance Manifesto

UNICEF 10 Point Children’s Data Governance Manifesto

Published on: Aug 11 2021 by Guest Writer - Comments Off on UNICEF 10 Point Children’s Data Governance Manifesto
This year, 123 million children will celebrate their 18th birthday and entry into adulthood. For each boy or girl, tens of thousands of data points on average will...
The Gold Standard Data Responsibility Toolkit for Cash Transfers

The Gold Standard Data Responsibility Toolkit for Cash Transfers

Published on: Jun 02 2021 by Linda Raftree - Comments Off on The Gold Standard Data Responsibility Toolkit for Cash Transfers
While all humanitarian programmes collect large amounts of data, in Cash and Voucher Assistance we collect large volumes of data that is often shared with multiple...
11 Strategies to Manage Data Sharing with Government Agencies

11 Strategies to Manage Data Sharing with Government Agencies

Published on: May 26 2021 by Linda Raftree - 2 Comments
In recent months, there have been an increasing number of questions among cash and voucher assistance (CVA) actors about data sharing with government authorities...