2.4 Protecting personal data
Data privacy legislation applies only to personally identifiable data, not to data sets where it is impossible to
identify any individual. For example, the inclusion in a data set of a name, address, email address or phone
number would create personally identifiable data. It might also occur if there were an exact geographic
location or postal code that could be combined with other information in the data set.
Researchers must ensure that data sets or other materials (photographs, recordings, paper documents,
etc.) collected for market research that contain personally identifiable information are kept securely and are
only used for market research purposes. Personally identifiable data can only be passed on to a research
user, if the participant has explicitly expressed this wish, or gives explicit consent and on the understanding
that no commercial activity will be directed at them as a direct result of their having provided information.
Researchers are advised to have written agreements with research user clients to ensure these
requirements are respected. Personally identifiable data collected for research purposes cannot be used for
non-research purposes. However, data that have been 100% anonymised and therefore no longer
personally identifiable can be passed on to research user clients and processed for other purposes.
Researchers should also recognise that some personally identifiable information may be characterised as
“sensitive” and therefore handled with greater care.
Two features of newer data collection methods like mobile make protection of personal data more complex:
(1) increased involvement of research users in the research process and (2) shortened cycle times. It
therefore is essential that researchers anticipate the potential for research users to inadvertently hear or
see things that may be defined as personal data and design the research to minimise such risks. Likewise,
interim deliverables or sharing of research materials via applications such as online portals should be
designed with the same protections as planned for final deliverables.
Data privacy legislation normally specifies an individual’s right of access to data held in a personally
identifiable form, to view records being held in their name and to request corrections if there are errors. This
right of access no longer applies once the personally identifiable elements have been removed from the
data set.
2.4 Protecting personal dataData privacy legislation applies only to personally identifiable data, not to data sets where it is impossible toidentify any individual. For example, the inclusion in a data set of a name, address, email address or phonenumber would create personally identifiable data. It might also occur if there were an exact geographiclocation or postal code that could be combined with other information in the data set.Researchers must ensure that data sets or other materials (photographs, recordings, paper documents,etc.) collected for market research that contain personally identifiable information are kept securely and areonly used for market research purposes. Personally identifiable data can only be passed on to a researchuser, if the participant has explicitly expressed this wish, or gives explicit consent and on the understandingthat no commercial activity will be directed at them as a direct result of their having provided information.Researchers are advised to have written agreements with research user clients to ensure theserequirements are respected. Personally identifiable data collected for research purposes cannot be used fornon-research purposes. However, data that have been 100% anonymised and therefore no longerpersonally identifiable can be passed on to research user clients and processed for other purposes.Researchers should also recognise that some personally identifiable information may be characterised as“sensitive” and therefore handled with greater care.
Two features of newer data collection methods like mobile make protection of personal data more complex:
(1) increased involvement of research users in the research process and (2) shortened cycle times. It
therefore is essential that researchers anticipate the potential for research users to inadvertently hear or
see things that may be defined as personal data and design the research to minimise such risks. Likewise,
interim deliverables or sharing of research materials via applications such as online portals should be
designed with the same protections as planned for final deliverables.
Data privacy legislation normally specifies an individual’s right of access to data held in a personally
identifiable form, to view records being held in their name and to request corrections if there are errors. This
right of access no longer applies once the personally identifiable elements have been removed from the
data set.
การแปล กรุณารอสักครู่..
