Skip to article frontmatterSkip to article content
The image shows a traing taking a different track when delaing with sensitive data. This includes encyrption, consent, de-identification, synthetic data and data safe havens.

Figure 1:The Turing Way project illustration by Scriberia. Used under a CC-BY 4.0 licence. DOI: The Turing Way Community & Scriberia (2024).

Prerequisites

PrerequisiteImportanceSkill LevelNotes
Sensitive Data ProjectsHelpfulBeginner

Summary

In this chapter, we describe specific ways that you can manage sensitive data.

This includes:

  • Informed consent
  • Data Privacy Strategies
  • Sharing sensitive data

Motivation

Researchers need to conform to legal and ethical restrictions when working with sensitive data. There are many ways that you can do this and it will depend on the type of data that you are analysing.

References
  1. The Turing Way Community, & Scriberia. (2024). Illustrations from The Turing Way: Shared under CC-BY 4.0 for reuse. Zenodo. 10.5281/ZENODO.3332807