virtual microdata laboratory
play

Virtual Microdata Laboratory Access to Confidential Data Richard - PowerPoint PPT Presentation

Virtual Microdata Laboratory Access to Confidential Data Richard Welpton richard.welpton@ons.gsi.gov.uk Summary Background Our place in the UK How it works Governance Managing researchers Background VML established 2004


  1. Virtual Microdata Laboratory Access to Confidential Data Richard Welpton richard.welpton@ons.gsi.gov.uk

  2. Summary • Background • Our place in the UK • How it works • Governance • Managing researchers

  3. Background • VML established 2004 to provide secure research access to ONS business data • Original aim to support research into business activity • 2008: Majority of applications related to studies of earnings • 2009: Support for Migrant Worker Scan (Titchfield) • Future : Default secure location for sensitive data across Government • Future : Continued expansion across GSI • Future: Social Data

  4. Our place in the UK More confidential, more secure Virtual Special No microdata UKDA Web licence release laboratory Business data, Census, Not GHS Aggregate Census data health data, anonymised LFS data OGD access to business data Less confidential, easier access

  5. VML Setting Secure lab Researcher VML staff Data read only work area Logs in to server Direct access read-write only screen shots, to server no data Output Input automatic transfer archiving of all transfers Input Output

  6. Governance (1): Access to the VML • 1: Apply for Approved Researcher status • 2: Application checked by VML staff • 3: ONS Microdata Release Panel • Project has a “valid statistical purpose” • Researcher is “fit and proper” • 4:Researcher(s) are notified of approval • 5:Training seminar and VML induction compulsory • Legal background • Statistical Disclosure Control training • 6: Researcher free to use VML facilities

  7. Governance (2): VML security model • valid statistical purpose safe projects • trusted researchers + safe people • anonymisation of data + safe data • technical controls around data + safe setting • disclosure control of results + safe outputs  safe use

  8. Governance (3): Security • VML is a secure „box‟ • All statistical outputs are reviewed by VML • Person risk: SRSA introduces strong penalties • Independent security review: The approach adopted is commendable and considerably exceeds similar practices in Government and industry • We hold both ONS and OGD data – for linking • Not 100% safe – 2 breaches from 450 researchers over 4 years • A model for secure/efficient data access within the UK and abroad • Reputation as a secure and convenient store for data

  9. Managing Researchers (1) Data management: Researcher researcher as risk Management: Researcher as colllaborator ‘we’re doing this to ‘doing this allows us Explaining security protect the data’ policy to supply you with more detailed data’ (from you) ‘you must limit your ‘limit your output Limiting quantity of results output to reduce the because we have chance of disclosure’ finite resources: people who produce good output get their results back quicker’ Source: Desai, T. and Ritchie, F (2010) “Effective Researcher Management”

  10. Managing Researchers (2): Why manage? Benefits (of being nice!): • Increased communication • Increased understanding • Increased cooperation • Effective change management • Better data security • Better research • More efficient use of NSI resources

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend