diff --git a/client/package.json b/client/package.json index a2726e5..9353580 100644 --- a/client/package.json +++ b/client/package.json @@ -1,6 +1,6 @@ { "name": "Data Sharing Risk Assessment - Client", - "version": "2.0.1", + "version": "2.0.2", "private": true, "repository": { "type": "git", diff --git a/client/public/json/checkpoints.json b/client/public/json/checkpoints.json index aa40350..c0ed35a 100644 --- a/client/public/json/checkpoints.json +++ b/client/public/json/checkpoints.json @@ -1,955 +1,859 @@ [ { - "id": 1, - "title": "Does the data contain any personal data?", - "text": "Put simply, personal data can be defined as specific information about ‘an identifiable person’, such as name or location. There are lots of different types of data about people. Some types of personal data are more sensitive than others.", - "extra_text": "", - "category": "Legal & Regulatory", - "options": [ - { - "option": "Yes", - "explain_risk": true, - "risk_level": "red", - "explain_text": "" - }, - { - "option": "No", - "explain_risk": false, - "risk_level": "green" - }, - { - "option": "Uncertain", - "explain_risk": true, - "risk_level": "amber" - } - ], - "considerations": { - "title": "Have you considered:", - "items": [ - "the lawful basis for using and sharing personal data?", - "the rights of the data subject (the person the data is about)?", - "the liabilities and penalties for breaching the regulations in relevant jurisdiction(s)?" - ] - }, - "background_info": [ - { - "title": "Background Information", - "text": "Most countries will have different definitions and categories of personal data but generally speaking any data or information directly relating to an identifiable individual is personal. This includes images of a person, or group of people.

Data protection regulations across the world are designed to minimise the risk of harmful impacts, while enabling personal data to be processed, that is, to be collected, accessed, used and shared. These regulations typically outline three key things:

Some types of personal data are more sensitive than others. Best-practice data-protection legislation defines sensitive personal information as ‘special category’ data and includes attributes such as race, ethnic origin, religious or philosophical beliefs, biometric data (where this is used for identification purposes) and health data.

Examples of personal and sensitive personal data:

Personal data: name, address, telephone number, IP address, location data, online identifiers (cookies)

Special category (sensitive) personal data: age, gender, race, religion or belief, political affiliation, biometrics, disability, criminal record, health, sexual orientation, relationship status

Read the full guidance online

" - } - ], - "examples": [ - { - "title": "Examples of personal data", - "text": "

Examples of personal and sensitive personal data:

Personal data: name, address, telephone number, IP address, location data, online identifiers (cookies)

Special category (sensitive) personal data: age, gender, race, religion or belief, political affiliation, biometrics, disability, criminal record, health, sexual orientation, relationship status

Read the full guidance online

" - } - ], - "mitigating_actions": [ - { - "title": "Mitigating Actions", - "text": "If the data asset does contain personal data, there is a risk of identifying individuals and this could cause them harm and breach legal, regulatory or contractual obligations.

To help manage this, and share data as widely as possible, there are several common mitigation options available to minimise the risks of re-identification:

Anonymisation

Anonymisation means processing data into a modified form that can be shared or published while significantly reducing the possibility of re-identifying individuals. Techniques include suppression of parts of the data, generalisation, randomisation and pseudonymisation.

Use synthetic data

In some situations (for example research) it might be appropriate to share data that contains many of the statistical patterns of an original dataset, but eliminates identifying personal information. This is known as synthetic data, and it involves an automated process to make up (synthesise) data in a way that enables the same conclusions to be drawn from the data. This tutorial shows how to create a synthetic dataset.

Share the data under contract

A contract with detailed, binding rules ensures all parties are clear on their legal obligations. Data sharing agreements can be useful when organisations of any kind are collecting, using or sharing data that is of a personal or sensitive nature." - } - ], - "explain": [ - { - "exampleRisks": { - "title": "Potential risks:", - "items": [ - "Unauthorised access to personal data leading to identity theft.", - "Data breaches causing financial loss and reputational damage.", - "Non-compliance with data protection regulations resulting in legal penalties.", - "Misuse of personal data for fraudulent activities.", - "Increased vulnerability to phishing attacks.", - "Unintended exposure of sensitive personal information.", - "Ethical concerns over data privacy and consent." - ] - }, - "exampleActions": { - "title": "Mitigating actions:", + "id": 1, + "title": "Does the data contain any personal data?", + "text": "Put simply, personal data can be defined as specific information about \u2018an identifiable person\u2019, such as name or location. There are lots of different types of data about people. Some types of personal data are more sensitive than others.", + "extra_text": "", + "category": "Legal & Regulatory", + "options": [ + { + "option": "Yes", + "explain_risk": true, + "risk_level": "red", + "explain_text": "" + }, + { + "option": "No", + "explain_risk": false, + "risk_level": "green" + }, + { + "option": "Uncertain", + "explain_risk": true, + "risk_level": "amber" + } + ], + "considerations": { + "title": "Have you considered:", "items": [ - "Anonymise the data", - "Use synthetic data", - "Share the data under contract", - "Other?" + "the lawful basis for using and sharing personal data?", + "the rights of the data subject (the person the data is about)?", + "the liabilities and penalties for breaching the regulations in relevant jurisdiction(s)?" ] - } + }, + "background_info": { + "title": "Background Information", + "text": "Most countries will have different definitions and categories of personal data but generally speaking any data or information directly relating to an identifiable individual is personal. This includes images of a person, or group of people.

Data protection regulations across the world are designed to minimise the risk of harmful impacts, while enabling personal data to be processed, that is, to be collected, accessed, used and shared. These regulations typically outline three key things:

Some types of personal data are more sensitive than others. Best-practice data-protection legislation defines sensitive personal information as \u2018special category\u2019 data and includes attributes such as race, ethnic origin, religious or philosophical beliefs, biometric data (where this is used for identification purposes) and health data.

Examples of personal and sensitive personal data:

Personal data: name, address, telephone number, IP address, location data, online identifiers (cookies)

Special category (sensitive) personal data: age, gender, race, religion or belief, political affiliation, biometrics, disability, criminal record, health, sexual orientation, relationship status

Read the full guidance online

" + }, + "examples": { + "title": "Examples of personal data", + "text": "

Examples of personal and sensitive personal data:

Personal data: name, address, telephone number, IP address, location data, online identifiers (cookies)

Special category (sensitive) personal data: age, gender, race, religion or belief, political affiliation, biometrics, disability, criminal record, health, sexual orientation, relationship status

Read the full guidance online

" + }, + "mitigating_actions": { + "title": "Mitigating Actions", + "text": "If the data asset does contain personal data, there is a risk of identifying individuals and this could cause them harm and breach legal, regulatory or contractual obligations.

To help manage this, and share data as widely as possible, there are several common mitigation options available to minimise the risks of re-identification:

Anonymisation

Anonymisation means processing data into a modified form that can be shared or published while significantly reducing the possibility of re-identifying individuals. Techniques include suppression of parts of the data, generalisation, randomisation and pseudonymisation.

Use synthetic data

In some situations (for example research) it might be appropriate to share data that contains many of the statistical patterns of an original dataset, but eliminates identifying personal information. This is known as synthetic data, and it involves an automated process to make up (synthesise) data in a way that enables the same conclusions to be drawn from the data. This tutorial shows how to create a synthetic dataset.

Share the data under contract

A contract with detailed, binding rules ensures all parties are clear on their legal obligations. Data sharing agreements can be useful when organisations of any kind are collecting, using or sharing data that is of a personal or sensitive nature." + }, + "explain": { + "exampleRisks": { + "title": "Potential risks:", + "items": [ + "Unauthorised access to personal data leading to identity theft.", + "Data breaches causing financial loss and reputational damage.", + "Non-compliance with data protection regulations resulting in legal penalties.", + "Misuse of personal data for fraudulent activities.", + "Increased vulnerability to phishing attacks.", + "Unintended exposure of sensitive personal information.", + "Ethical concerns over data privacy and consent." + ] + }, + "exampleActions": { + "title": "Mitigating actions:", + "items": [ + "Anonymise the data", + "Use synthetic data", + "Share the data under contract", + "Other?" + ] + } } - ] }, { - "id": 2, - "title": "Does the data contain third party data?", - "text": "When an individual or an organisation puts intellectual effort into creating something, such as taking a photograph or collecting data, the law grants them specific rights of ownership over that work. Different countries will have specific laws and definitions but generally speaking, by default, the data creator holds exclusive rights to use the data, so that others must seek or be given the permission to use the data themselves.", - "extra_text": "", - "category": "Legal & Regulatory", - "options": [ - { - "option": "Yes", - "explain_risk": true, - "risk_level": "red" - }, - { - "option": "No", - "explain_risk": false, - "risk_level": "green" - }, - { - "option": "Uncertain", - "explain_risk": true, - "risk_level": "amber" - } - ], - "considerations": { - "title": "Have you considered if the data is:", - "items": [ - "created and owned by you/ your organisation.", - "completely licensed from someone else.", - "includes an extract of content or data licensed from someone else.", - "derived from the content or data licensed from someone else." - ] - }, - "background_info": [ - { - "title": "Background Information", - "text": "When an individual or an organisation puts intellectual effort into creating something, such as taking a photograph or collecting data, the law grants them specific rights of ownership over that work.

Different countries will have specific laws and definitions but generally speaking, by default, the data creator holds exclusive rights to use the data, so that others must seek or be given the permission to use the data themselves.

Therefore it is important to review the terms under which you are using and sharing the data, to ensure you have the relevant permissions. These permissions are usually found in a licence accompanying the data, or in the contract (for example a data sharing agreement) setting out the terms under which data was provided.

" - } - ], - "examples": [ - { - "title": "Examples of data typically sourced from third parties:", - "text": "" - } - ], - "mitigating_actions": [ - { - "title": "Mitigating Actions", - "text": "If the data asset you want to share does contain third-party data or you are not sure if you have the legal permissions to share data, you can manage this risk by:

Engaging the third party data steward

Convening a conversation with the third-party data steward that provides the data can help to explore, understand and overcome any possible intellectual property (IP) issues and establish that onward use and sharing is permitted. If the data is not under an open licence and the steward places some restrictions on how the data can be used or shared, it may be possible to agree to share the data under a contract or licence that complies with the relevant permissions. Having these conversations can help to ensure legal risks around sharing data are minimised." - } - ], - "requires_mitigation_form": true, - "explain": [ - { - "exampleRisks": { - "title": "Potential risks:", + "id": 2, + "title": "Does the data contain third party data?", + "text": "When an individual or an organisation puts intellectual effort into creating something, such as taking a photograph or collecting data, the law grants them specific rights of ownership over that work. Different countries will have specific laws and definitions but generally speaking, by default, the data creator holds exclusive rights to use the data, so that others must seek or be given the permission to use the data themselves.", + "extra_text": "", + "category": "Legal & Regulatory", + "options": [ + { + "option": "Yes", + "explain_risk": true, + "risk_level": "red" + }, + { + "option": "No", + "explain_risk": false, + "risk_level": "green" + }, + { + "option": "Uncertain", + "explain_risk": true, + "risk_level": "amber" + } + ], + "considerations": { + "title": "Have you considered if the data is:", "items": [ - "Unauthorised use of third-party data leading to legal disputes.", - "Breaching intellectual property rights resulting in financial penalties.", - "Loss of trust and reputational damage with third-party data providers.", - "Inadvertent sharing of restricted or proprietary information.", - "Potential injunctions or legal action to cease data usage.", - "Non-compliance with data sharing agreements.", - "Ethical concerns over using data without proper consent." + "created and owned by you/ your organisation.", + "completely licensed from someone else.", + "includes an extract of content or data licensed from someone else.", + "derived from the content or data licensed from someone else." ] - }, - "exampleActions": { - "title": "Mitigating actions:", - "items": [ - "Engage the third-party data steward to confirm permissions.", - "Review and comply with data licensing agreements.", - "Secure necessary permissions or licences for data usage.", - "Establish clear data sharing agreements with third parties.", - "Consult legal experts to ensure compliance with intellectual property laws.", - "Use data anonymisation techniques where applicable.", - "Other?" - ] - } + }, + "background_info": { + "title": "Background Information", + "text": "When an individual or an organisation puts intellectual effort into creating something, such as taking a photograph or collecting data, the law grants them specific rights of ownership over that work.

Different countries will have specific laws and definitions but generally speaking, by default, the data creator holds exclusive rights to use the data, so that others must seek or be given the permission to use the data themselves.

Therefore it is important to review the terms under which you are using and sharing the data, to ensure you have the relevant permissions. These permissions are usually found in a licence accompanying the data, or in the contract (for example a data sharing agreement) setting out the terms under which data was provided.

" + }, + "examples": { + "title": "Examples of data typically sourced from third parties:", + "text": "" + }, + "mitigating_actions": { + "title": "Mitigating Actions", + "text": "If the data asset you want to share does contain third-party data or you are not sure if you have the legal permissions to share data, you can manage this risk by:

Engaging the third party data steward

Convening a conversation with the third-party data steward that provides the data can help to explore, understand and overcome any possible intellectual property (IP) issues and establish that onward use and sharing is permitted. If the data is not under an open licence and the steward places some restrictions on how the data can be used or shared, it may be possible to agree to share the data under a contract or licence that complies with the relevant permissions. Having these conversations can help to ensure legal risks around sharing data are minimised." + }, + "requires_mitigation_form": true, + "explain": { + "exampleRisks": { + "title": "Potential risks:", + "items": [ + "Unauthorised use of third-party data leading to legal disputes.", + "Breaching intellectual property rights resulting in financial penalties.", + "Loss of trust and reputational damage with third-party data providers.", + "Inadvertent sharing of restricted or proprietary information.", + "Potential injunctions or legal action to cease data usage.", + "Non-compliance with data sharing agreements.", + "Ethical concerns over using data without proper consent." + ] + }, + "exampleActions": { + "title": "Mitigating actions:", + "items": [ + "Engage the third-party data steward to confirm permissions.", + "Review and comply with data licensing agreements.", + "Secure necessary permissions or licences for data usage.", + "Establish clear data sharing agreements with third parties.", + "Consult legal experts to ensure compliance with intellectual property laws.", + "Use data anonymisation techniques where applicable.", + "Other?" + ] + } } - ] }, { - "id": 3, - "title": "Are there any other legal or regulatory considerations relevant to this data?", - "text": "There may be other legal or regulatory considerations from non-data-related legislation, or specific to your sector (for example the Equality Act 2010 and freedom of information requests) that will need consideration when sharing data.", - "extra_text": "", - "category": "Legal & Regulatory", - "options": [ - { - "option": "Yes", - "explain_risk": true, - "risk_level": "red" - }, - { - "option": "No", - "explain_risk": false, - "risk_level": "green" - }, - { - "option": "Uncertain", - "explain_risk": true, - "risk_level": "amber" - } - ], - "considerations": { - "title": "Have you considered:", - "items": [ - "sector-specific legislation?", - "specific intellectual property laws?", - "individual righst to data?", - "rights of data creators?", - "rights of goverments?", - "rights of citizens?" - ] - }, - "background_info": [ - { - "title": "Background Information", - "text": "

There may be other legal or regulatory considerations from non-data-related legislation, or specific to your sector (for example the Equality Act 2010 and freedom of information requests) that will need consideration when sharing data.

These considerations might require you to make the data available, or restrict you from doing so. There may also be requirements to remove or grant access to data after a set period of time.

This might include sector-specific legislation (for example financial institutions have particular duties and biometric data has particular limits).

It might also include data licensing or intellectual property laws; or insights into data rights, for example, individual rights to data, rights for data creators, rights for governments and rights for citizens.

" - } - ], - "examples": [ - { - "title": "Examples of other legal or regulatory considerations: ", - "text": "

Legal:

Local laws on competition, intellectual property, digital economy, human rights, equalities act.

Sector-specific legislation:

Financial sector climate-related disclosures, oil and gas sector requirements around geophysical/seismic data, requests for environmental information.

Policy:

National data sharing and access policies or frameworks, requirements from international organisations that promote a specific type of data access, and sector or country codes of practice.

" - } - ], - "mitigating_actions": [ - { - "title": "Mitigating actions", - "text": "If there are other relevant legal or regulatory requirements you may still be able to share the data. To manage any risks, you could carry out the below processes:

Share the data under contract

Data-sharing agreements can be useful when organisations of any kind are sharing data of a sensitive nature. A contract with detailed, binding rules ensures all parties are clear on their legal obligations.

Anonymise the data

Anonymisation includes suppression of parts of the data, generalisation, randomisation and pseudonymisation. Redacting or changing the data using these techniques could help to minimise risk from certain aspects of the data being shared.

Use synthetic data

In some situations (for example research) it might be appropriate to share data that contains many of the statistical patterns of an original dataset. This is known as synthetic data, and it involves an automated process to make up (synthesise) data in a way that enables the same conclusions to be drawn from the data. This tutorial shows how to create a synthetic dataset.

" - } - ], - "explain": [ - { - "exampleRisks": { - "title": "Potential risks:", + "id": 3, + "title": "Are there any other legal or regulatory considerations relevant to this data?", + "text": "There may be other legal or regulatory considerations from non-data-related legislation, or specific to your sector (for example the Equality Act 2010 and freedom of information requests) that will need consideration when sharing data.", + "extra_text": "", + "category": "Legal & Regulatory", + "options": [ + { + "option": "Yes", + "explain_risk": true, + "risk_level": "red" + }, + { + "option": "No", + "explain_risk": false, + "risk_level": "green" + }, + { + "option": "Uncertain", + "explain_risk": true, + "risk_level": "amber" + } + ], + "considerations": { + "title": "Have you considered:", "items": [ - "Non-compliance with sector-specific legislation leading to fines or legal action.", - "Violation of intellectual property rights resulting in lawsuits.", - "Failure to adhere to national or international data policies causing reputational damage.", - "Inadvertent breach of privacy laws and regulations.", - "Exposure to regulatory scrutiny and potential sanctions.", - "Negative impact on stakeholders due to ethical concerns.", - "Risk of unintended consequences affecting vulnerable populations." + "sector-specific legislation?", + "specific intellectual property laws?", + "individual righst to data?", + "rights of data creators?", + "rights of goverments?", + "rights of citizens?" ] - }, - "exampleActions": { - "title": "Mitigating actions:", - "items": [ - "Seek advice from specialists in your sector or legal experts.", - "Utilise tools like Consequence Scanning and the Data Ethics Canvas.", - "Ensure data sharing agreements are in place with clear legal obligations.", - "Implement data anonymisation techniques to protect privacy.", - "Consider using synthetic data to avoid sharing sensitive information.", - "Stay informed about relevant legal and regulatory updates.", - "Other?" - ] - } + }, + "background_info": { + "title": "Background Information", + "text": "

There may be other legal or regulatory considerations from non-data-related legislation, or specific to your sector (for example the Equality Act 2010 and freedom of information requests) that will need consideration when sharing data.

These considerations might require you to make the data available, or restrict you from doing so. There may also be requirements to remove or grant access to data after a set period of time.

This might include sector-specific legislation (for example financial institutions have particular duties and biometric data has particular limits).

It might also include data licensing or intellectual property laws; or insights into data rights, for example, individual rights to data, rights for data creators, rights for governments and rights for citizens.

" + }, + "examples": { + "title": "Examples of other legal or regulatory considerations: ", + "text": "

Legal:

Local laws on competition, intellectual property, digital economy, human rights, equalities act.

Sector-specific legislation:

Financial sector climate-related disclosures, oil and gas sector requirements around geophysical/seismic data, requests for environmental information.

Policy:

National data sharing and access policies or frameworks, requirements from international organisations that promote a specific type of data access, and sector or country codes of practice.

" + }, + "mitigating_actions": { + "title": "Mitigating actions", + "text": "If there are other relevant legal or regulatory requirements you may still be able to share the data. To manage any risks, you could carry out the below processes:

Share the data under contract

Data-sharing agreements can be useful when organisations of any kind are sharing data of a sensitive nature. A contract with detailed, binding rules ensures all parties are clear on their legal obligations.

Anonymise the data

Anonymisation includes suppression of parts of the data, generalisation, randomisation and pseudonymisation. Redacting or changing the data using these techniques could help to minimise risk from certain aspects of the data being shared.

Use synthetic data

In some situations (for example research) it might be appropriate to share data that contains many of the statistical patterns of an original dataset. This is known as synthetic data, and it involves an automated process to make up (synthesise) data in a way that enables the same conclusions to be drawn from the data. This tutorial shows how to create a synthetic dataset.

" + }, + "explain": { + "exampleRisks": { + "title": "Potential risks:", + "items": [ + "Non-compliance with sector-specific legislation leading to fines or legal action.", + "Violation of intellectual property rights resulting in lawsuits.", + "Failure to adhere to national or international data policies causing reputational damage.", + "Inadvertent breach of privacy laws and regulations.", + "Exposure to regulatory scrutiny and potential sanctions.", + "Negative impact on stakeholders due to ethical concerns.", + "Risk of unintended consequences affecting vulnerable populations." + ] + }, + "exampleActions": { + "title": "Mitigating actions:", + "items": [ + "Seek advice from specialists in your sector or legal experts.", + "Utilise tools like Consequence Scanning and the Data Ethics Canvas.", + "Ensure data sharing agreements are in place with clear legal obligations.", + "Implement data anonymisation techniques to protect privacy.", + "Consider using synthetic data to avoid sharing sensitive information.", + "Stay informed about relevant legal and regulatory updates.", + "Other?" + ] + } } - ] }, { - "id": 4, - "title": "Does the data contain anything that, if made available, could impact national security? ", - "text": "National security, is broadly defined as the safety of a nation against threats such as terrorism, war, natural disaster, and could be put at risk through the release of data. This includes any data that could be used to cause actual harm, deprivation or fear of the same.", - "extra_text": "", - "category": "Ethical", - "options": [ - { - "option": "Yes", - "explain_risk": true, - "risk_level": "red" - }, - { - "option": "No", - "explain_risk": false, - "risk_level": "green" - }, - { - "option": "Uncertain", - "explain_risk": true, - "risk_level": "amber" - }, - { - "option": "N/A", - "explain_risk": false, - "risk_level": "green" - } - ], - "considerations": { - "title": "Have you considered:", - "items": [ - "if the data could be used to cause harm?", - "if the data is already shared in the public realm?" - ] - }, - "background_info": [ - { - "title": "Background Information", - "text": "

National security, is broadly defined as the safety of a nation against threats such as terrorism, war, natural disaster, and could be put at risk through the release of data. This includes any data that could be used to cause actual harm, deprivation or fear of the same.

If the data asset includes details that you think may impact national security, you may want to consider whether the data is already publicly available. It may be that the elements of the data you are concerned about are already shared by the government, public or private sector organisation. For example, transport infrastructure is broadly available and used by many organisations for route finding. If this is the case, then sharing the same data within your dataset is unlikely to cause increased risk.

" - } - ], - "examples": [ - { - "title": "Examples of data that could impact national security: ", - "text": "