Skip to content
This repository has been archived by the owner on Dec 20, 2023. It is now read-only.

Commit

Permalink
Update links and remove Privacy Impact Assessment (#403)
Browse files Browse the repository at this point in the history
* Update links and remove Privacy Impact Assessment

* Updated link for storing PII

* added paragraph on privacy act

---------

Co-authored-by: Ben P <[email protected]>
  • Loading branch information
janelx and bpdesigns authored May 4, 2023
1 parent 56733a9 commit 7a2a836
Show file tree
Hide file tree
Showing 2 changed files with 11 additions and 17 deletions.
19 changes: 7 additions & 12 deletions _pages/research/privacy.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,20 +23,18 @@ subnav:

## Personally Identifiable Information (PII)

We protect participants’ privacy by giving them a say whenever we seek to collect identifying information about them. The Federal government defines personally identifiable information (PII) as “information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other information that is linked or linkable to a specific individual.” [(Obama White House Archives OMB circular A130)](https://obamawhitehouse.archives.gov/sites/default/files/omb/assets/OMB/circulars/a130/a130revised.pdf)
We protect participants’ privacy by giving them a say whenever we seek to collect identifying information about them. The definition of PII was updated in 2016 to include changes in law and the advancements of technology. The Federal government defines personally identifiable information (PII) as “information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other information that is linked or linkable to a specific individual.” [Circular A-130, “Managing Information as a Strategic Resource [PDF]](https://obamawhitehouse.archives.gov/sites/default/files/omb/assets/OMB/circulars/a130/a130revised.pdf).

What is considered PII depends on context. Recordings of people’s voices and photos and videos of people are always considered PII. This includes recorded interviews and usability tests. Email addresses, phone numbers, and mailing addresses are sometimes considered PII; and when collected, stored, or presented in combination with a first name they often become PII.
Each piece of collected or stored PII increases the risk of privacy violations. When possible, it’s best to refrain from collecting or storing PII at all (if you or your agency partner have questions about storing PII on third-party systems that have not been approved by GSA, you should consult with your partner agency’s Privacy Office). One way to do this is analyzing data collected via the [Digital Analytics Program](https://digital.gov/dap/).

[The Privacy Act of 1974 [Justice.gov]](https://www.justice.gov/opcl/privacy-act-1974) provides protection to individuals by ensuring that Federal agencies:
[The Privacy Act of 1974](https://www.justice.gov/opcl/privacy-act-1974) provides protection to individuals by ensuring that Federal agencies:

{:.list-item--margin-bottom-extra}
- Collect PII only when it is both legally authorized and necessary
- Present [Privacy Act Notices]({{ site.baseurl }}/resources/privacy-act-notice) whenever they collect PII (in order to allow for informed consent)
- Protect agency-held PII against anticipated threats to security or integrity which could result in substantial harm, embarrassment, inconvenience, or unfairness to the participant.

18F complies with the Privacy Act by following the information practices outlined in our [Privacy Impact Assessment for Design Research posted on GSA.gov](https://www.gsa.gov/cdnstatic/20200401_-_Design_Research_PIA_for%20posting.pdf). The [TTS Research Guild [GitHub]](https://github.com/18F/g-research) works with the [GSA Privacy Office](https://www.gsa.gov/reference/gsa-privacy-program) to annually review this assessment.

- 18F complies with the Privacy Act by following the information practices outlined in our [Privacy Act Statement for Design Research](https://www.gsa.gov/reference/gsa-privacy-program/privacy-act-statement-for-design-research on GSA.gov).

## Guidelines

Expand All @@ -45,9 +43,9 @@ Each piece of collected or stored PII increases the risk of privacy violations.
The following guidelines, drawn from our Privacy Impact Assessment for Design Research, help us build trust and protect privacy. This list isn’t exhaustive, but it’s a good place to start:

{:.list-item--margin-bottom-extra}
- Ask key stakeholders to [introduce you before conducting interviews]({{ site.baseurl }}/resources/email-templates/stakeholder-introduces-researcher) with their team
- Build rapport with research participants in advance of the research session — for example, [by emailing participants]({{ site.baseurl }}/resources/email-templates/researcher-sends-agreement) to see if they have any questions about the research, or briefly meeting with participants before the session begins to go over any logistical requirements
- Whenever you collect PII, store it digitally on [GSA’s approved systems for PII](https://www.gsa.gov/reference/gsa-privacy-program/privacy-impact-assessments-pia) and actively remove access to PII from anyone not on your project team; and always place paper documents with PII in locked file cabinets
- Ask key stakeholders to introduce you before conducting interviews with their team. [Email template: Stakeholder introduces researcher]({{ site.baseurl }}/resources/email-templates/stakeholder-introduces-researcher)
- Build rapport with research participants in advance of the research session — for example, by emailing participants to see if they have any questions about the research, or briefly meeting with participants before the session begins to go over any logistical requirements. [Email template: Researcher sends agreement to a participant]({{ site.baseurl }}/resources/email-templates/researcher-sends-agreement)
- Whenever you collect PII, store it digitally on [GSA’s approved systems for PII](https://www.gsa.gov/reference/gsa-privacy-program/systems-of-records-privacy-act/system-of-records-notices-sorns-privacy-act) and actively remove access to PII from anyone not on your project team; and always place paper documents with PII in locked file cabinets
- Store design research administrative data (for example, contact information collected during research participant recruiting) separate from study data (for example, recorded video of a usability test); share research-related records on a need-to-know basis
- Collect the [informed consent]({{site.baseurl}}/research/do/#getting-informed-consent) of anyone who participates in moderated research; we generally do this with a [participant agreement]({{ site.baseurl }}/participant-agreement)
- When scheduling research sessions via Google calendar, set the event visibility to “Private” (since invitations include the participant’s name and email address)
Expand All @@ -57,13 +55,10 @@ The following guidelines, drawn from our Privacy Impact Assessment for Design Re
- Ensure that any included quotes could be attributable to multiple participants so no one person can be identified as the person that said it
- If attribution is important, request the participant’s permission before incorporating personally identifying information or directly attributable information (for example, quotes with attribution) into shared analysis, reports or presentations. Be mindful of who might see the information. Don’t attribute information that could pose any personal or professional risks for the participant (for example, a negative comment about executive leadership included in a report shared with their organization).
- Be mindful of information norms before sharing and presenting research. For example, if you were to shadow an agency's acquisitions team, and notice that the team had freely discussed information about a particular vendor (such as reputation), that doesn't imply that your research artifacts (such as reports) could name the vendor in question or even the nature of the conversations you observed. In this case, you might ask members of the acquisitions team whether or not it's okay to include information about the conversation you observed.
- Periodically inventory and confirm need-to-know access to study data (as defined in our [Privacy Impact Assessment for Design Research](https://www.gsa.gov/cdnstatic/20181022%20-%20Design%20Research%20PIA_posted%20version.pdf))
- GSA’s Privacy Office welcomes questions and feedback anytime at [[email protected]](mailto:[email protected])

## Additional reading


{:.list-item--margin-bottom-extra}
- [OMB’s Circular A-130, The Fair Information Practice Principles](https://obamawhitehouse.archives.gov/sites/default/files/omb/assets/OMB/circulars/a130/a130revised.pdf)
- [GSA Privacy Office's presentation to the TTS Research Guild](https://gsa-tts.slack.com/files/U9KLLKS4W/FCSFWBZD3/researchguildprivacytalk091218.mp4)
- [Circular A-130, “Managing Information as a Strategic Resource [PDF]](https://obamawhitehouse.archives.gov/sites/default/files/omb/assets/OMB/circulars/a130/a130revised.pdf)
- [6 tips for protecting PII in design research](https://drive.google.com/a/gsa.gov/open?id=1MM6tNlFc-Iwgw_cCUw_0KS8oQMS-FEN7sYftPQLmLAg)
9 changes: 4 additions & 5 deletions _pages/resources.md
Original file line number Diff line number Diff line change
Expand Up @@ -100,8 +100,7 @@ We most commonly share our work via presentations. These presentations can vary

* Utilize our [18F-branded templates found on the 18F brand site](https://brand.18f.gov/templates/) to maintain consistency and save time.
* The presentation deck should tell a compelling story and be easy to read. Make sure to include enough content so those not able to attend the presentation can view the deck later and understand what you’re aiming to communicate. Refer to this presentation on [How to design a better deck](https://docs.google.com/presentation/d/1WMbN1feG1bMhaFx5YbXoYUTE7xgZdMewMaQBZeL3YmA/edit#slide=id.g58dd554fac_0_397) for additional pointers and guidance.
* Check out the [Project resources folder](https://drive.google.com/drive/folders/1L9qqS6-b-emvlWJ4JPCG58LW62bbV361) for reusable content and templates; browse [previous 18F Path Analysis project artifacts](https://github.com/18F/project-artifacts/blob/master/projects.md) for inspiration; or view the [Design wiki](https://github.com/18F/Design-Wiki/wiki) for additional examples.
* Consider making a [microrequest](https://handbook.tts.gsa.gov/microrequests/) if you’re unsure how to articulate or visualize an idea.
* Check out the [Project resources folder](https://drive.google.com/drive/folders/1L9qqS6-b-emvlWJ4JPCG58LW62bbV361) for reusable content and templates; browse [previous 18F Path Analysis project artifacts [Github]](https://github.com/18F/project-artifacts/blob/master/projects.md) for inspiration; or view the <img src="/images/lock.svg" alt="GSA access only" width="16" height="16">[Design wiki [Github]](https://github.com/18F/Design-Wiki/wiki) for additional examples.
* Feel free to include references or links to further reading at the end of your presentation.


Expand All @@ -115,9 +114,9 @@ We most commonly share our work via presentations. These presentations can vary
- [GSA TTS Handbook](https://handbook.tts.gsa.gov/)
- [18F Methods](https://methods.18f.gov/)
- [USDS Playbook](https://playbook.cio.gov/)
- [New Hire README](https://docs.google.com/document/d/19naJ8wgVo_hnv_nUy2WWyzH6DJwXXgenD0QpsZmOSe0/edit#)
- [New Hire README](https://handbook.tts.gsa.gov/getting-started/)
- [Project Start Guide](https://docs.google.com/document/d/1jFGksReKrt2PY_QVe7fj1aOCcyjHlGPf5hkKgv7nuMA/edit?pli=1#)
- [List of prior path analyses](https://github.com/18F/path-analysis/blob/master/projects.md)
- [List of prior path analyses [Github]](https://github.com/18F/path-analysis/blob/master/projects.md)
- [Project resources folder](https://drive.google.com/drive/folders/1L9qqS6-b-emvlWJ4JPCG58LW62bbV361)
- [Six weird tips for protecting PII](https://drive.google.com/a/gsa.gov/open?id=1MM6tNlFc-Iwgw_cCUw_0KS8oQMS-FEN7sYftPQLmLAg)
- [Artifacts from design-led projects](https://drive.google.com/drive/folders/1NZG-bxIeFiOw0sAn32a4APJc_TipCrQp)
Expand All @@ -129,7 +128,7 @@ We most commonly share our work via presentations. These presentations can vary
- [Project Start Guide](https://docs.google.com/document/d/1jFGksReKrt2PY_QVe7fj1aOCcyjHlGPf5hkKgv7nuMA/edit?pli=1#)
- [18F Content Guide](https://content-guide.18f.gov/)
- [TTS Engineering Guide Front-end practices](https://frontend.18f.gov/)
- [18F Analytics standards](https://github.com/18F/analytics-standards/)
- [18F Analytics standards [Github]](https://github.com/18F/analytics-standards/)
- [18F Accessibility Guide](https://accessibility.18f.gov/)
- [Agile Principles and 18F Practices](https://agile.18f.gov/)
- [Before You Ship: TTS guide to launching software](https://before-you-ship.18f.gov/)
Expand Down

0 comments on commit 7a2a836

Please sign in to comment.