This repository has been archived by the owner on Dec 20, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 31
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Update links and remove Privacy Impact Assessment (#403)
* Update links and remove Privacy Impact Assessment * Updated link for storing PII * added paragraph on privacy act --------- Co-authored-by: Ben P <[email protected]>
- Loading branch information
Showing
2 changed files
with
11 additions
and
17 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -23,20 +23,18 @@ subnav: | |
|
||
## Personally Identifiable Information (PII) | ||
|
||
We protect participants’ privacy by giving them a say whenever we seek to collect identifying information about them. The Federal government defines personally identifiable information (PII) as “information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other information that is linked or linkable to a specific individual.” [(Obama White House Archives OMB circular A130)](https://obamawhitehouse.archives.gov/sites/default/files/omb/assets/OMB/circulars/a130/a130revised.pdf) | ||
We protect participants’ privacy by giving them a say whenever we seek to collect identifying information about them. The definition of PII was updated in 2016 to include changes in law and the advancements of technology. The Federal government defines personally identifiable information (PII) as “information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other information that is linked or linkable to a specific individual.” [Circular A-130, “Managing Information as a Strategic Resource [PDF]](https://obamawhitehouse.archives.gov/sites/default/files/omb/assets/OMB/circulars/a130/a130revised.pdf). | ||
|
||
What is considered PII depends on context. Recordings of people’s voices and photos and videos of people are always considered PII. This includes recorded interviews and usability tests. Email addresses, phone numbers, and mailing addresses are sometimes considered PII; and when collected, stored, or presented in combination with a first name they often become PII. | ||
Each piece of collected or stored PII increases the risk of privacy violations. When possible, it’s best to refrain from collecting or storing PII at all (if you or your agency partner have questions about storing PII on third-party systems that have not been approved by GSA, you should consult with your partner agency’s Privacy Office). One way to do this is analyzing data collected via the [Digital Analytics Program](https://digital.gov/dap/). | ||
|
||
[The Privacy Act of 1974 [Justice.gov]](https://www.justice.gov/opcl/privacy-act-1974) provides protection to individuals by ensuring that Federal agencies: | ||
[The Privacy Act of 1974](https://www.justice.gov/opcl/privacy-act-1974) provides protection to individuals by ensuring that Federal agencies: | ||
|
||
{:.list-item--margin-bottom-extra} | ||
- Collect PII only when it is both legally authorized and necessary | ||
- Present [Privacy Act Notices]({{ site.baseurl }}/resources/privacy-act-notice) whenever they collect PII (in order to allow for informed consent) | ||
- Protect agency-held PII against anticipated threats to security or integrity which could result in substantial harm, embarrassment, inconvenience, or unfairness to the participant. | ||
|
||
18F complies with the Privacy Act by following the information practices outlined in our [Privacy Impact Assessment for Design Research posted on GSA.gov](https://www.gsa.gov/cdnstatic/20200401_-_Design_Research_PIA_for%20posting.pdf). The [TTS Research Guild [GitHub]](https://github.com/18F/g-research) works with the [GSA Privacy Office](https://www.gsa.gov/reference/gsa-privacy-program) to annually review this assessment. | ||
|
||
- 18F complies with the Privacy Act by following the information practices outlined in our [Privacy Act Statement for Design Research](https://www.gsa.gov/reference/gsa-privacy-program/privacy-act-statement-for-design-research on GSA.gov). | ||
|
||
## Guidelines | ||
|
||
|
@@ -45,9 +43,9 @@ Each piece of collected or stored PII increases the risk of privacy violations. | |
The following guidelines, drawn from our Privacy Impact Assessment for Design Research, help us build trust and protect privacy. This list isn’t exhaustive, but it’s a good place to start: | ||
|
||
{:.list-item--margin-bottom-extra} | ||
- Ask key stakeholders to [introduce you before conducting interviews]({{ site.baseurl }}/resources/email-templates/stakeholder-introduces-researcher) with their team | ||
- Build rapport with research participants in advance of the research session — for example, [by emailing participants]({{ site.baseurl }}/resources/email-templates/researcher-sends-agreement) to see if they have any questions about the research, or briefly meeting with participants before the session begins to go over any logistical requirements | ||
- Whenever you collect PII, store it digitally on [GSA’s approved systems for PII](https://www.gsa.gov/reference/gsa-privacy-program/privacy-impact-assessments-pia) and actively remove access to PII from anyone not on your project team; and always place paper documents with PII in locked file cabinets | ||
- Ask key stakeholders to introduce you before conducting interviews with their team. [Email template: Stakeholder introduces researcher]({{ site.baseurl }}/resources/email-templates/stakeholder-introduces-researcher) | ||
- Build rapport with research participants in advance of the research session — for example, by emailing participants to see if they have any questions about the research, or briefly meeting with participants before the session begins to go over any logistical requirements. [Email template: Researcher sends agreement to a participant]({{ site.baseurl }}/resources/email-templates/researcher-sends-agreement) | ||
- Whenever you collect PII, store it digitally on [GSA’s approved systems for PII](https://www.gsa.gov/reference/gsa-privacy-program/systems-of-records-privacy-act/system-of-records-notices-sorns-privacy-act) and actively remove access to PII from anyone not on your project team; and always place paper documents with PII in locked file cabinets | ||
- Store design research administrative data (for example, contact information collected during research participant recruiting) separate from study data (for example, recorded video of a usability test); share research-related records on a need-to-know basis | ||
- Collect the [informed consent]({{site.baseurl}}/research/do/#getting-informed-consent) of anyone who participates in moderated research; we generally do this with a [participant agreement]({{ site.baseurl }}/participant-agreement) | ||
- When scheduling research sessions via Google calendar, set the event visibility to “Private” (since invitations include the participant’s name and email address) | ||
|
@@ -57,13 +55,10 @@ The following guidelines, drawn from our Privacy Impact Assessment for Design Re | |
- Ensure that any included quotes could be attributable to multiple participants so no one person can be identified as the person that said it | ||
- If attribution is important, request the participant’s permission before incorporating personally identifying information or directly attributable information (for example, quotes with attribution) into shared analysis, reports or presentations. Be mindful of who might see the information. Don’t attribute information that could pose any personal or professional risks for the participant (for example, a negative comment about executive leadership included in a report shared with their organization). | ||
- Be mindful of information norms before sharing and presenting research. For example, if you were to shadow an agency's acquisitions team, and notice that the team had freely discussed information about a particular vendor (such as reputation), that doesn't imply that your research artifacts (such as reports) could name the vendor in question or even the nature of the conversations you observed. In this case, you might ask members of the acquisitions team whether or not it's okay to include information about the conversation you observed. | ||
- Periodically inventory and confirm need-to-know access to study data (as defined in our [Privacy Impact Assessment for Design Research](https://www.gsa.gov/cdnstatic/20181022%20-%20Design%20Research%20PIA_posted%20version.pdf)) | ||
- GSA’s Privacy Office welcomes questions and feedback anytime at [[email protected]](mailto:[email protected]) | ||
|
||
## Additional reading | ||
|
||
|
||
{:.list-item--margin-bottom-extra} | ||
- [OMB’s Circular A-130, The Fair Information Practice Principles](https://obamawhitehouse.archives.gov/sites/default/files/omb/assets/OMB/circulars/a130/a130revised.pdf) | ||
- [GSA Privacy Office's presentation to the TTS Research Guild](https://gsa-tts.slack.com/files/U9KLLKS4W/FCSFWBZD3/researchguildprivacytalk091218.mp4) | ||
- [Circular A-130, “Managing Information as a Strategic Resource [PDF]](https://obamawhitehouse.archives.gov/sites/default/files/omb/assets/OMB/circulars/a130/a130revised.pdf) | ||
- [6 tips for protecting PII in design research](https://drive.google.com/a/gsa.gov/open?id=1MM6tNlFc-Iwgw_cCUw_0KS8oQMS-FEN7sYftPQLmLAg) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters