14.03.2017 Views

policymakers demonstrate

EwB_Final_WithCover

EwB_Final_WithCover

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

570 Barcellan, Bøegh Nielsen, Calsamiglia, Camerer, Cantillon et al.<br />

already exist) and recent advances in computing power and data management<br />

techniques have made them easier to extract, manipulate and analyse. Last but<br />

not least, the possibility of linking different administrative datasets (for example,<br />

crime history and education history at the individual level) opens up endless<br />

possibilities for new research questions.<br />

But microdata are sensitive. Individuals have the right to have their privacy<br />

protected. Firm-level data can contain competition-sensitive information that<br />

firms may not want to become public. Providing secure access to microdata<br />

and linked microdata is also resource-intensive. These factors make the option<br />

of not providing any access attractive for risk-averse or resource-constrained<br />

statistical systems. This section describes the legal environment and practical<br />

solutions that the European Union and the different Member States have put or<br />

are putting in place to reconcile the need for data protection and the promotion<br />

of data access for research purposes.<br />

13.2.1 Legal and Technical Background<br />

The European framework for data protection relies on two principles: the protection<br />

of personal data as a basic right, and the promotion of the free flow<br />

of personal data as a common good. 2 These principles necessarily go hand in<br />

hand: data subjects will not accept to have data collected on them if they cannot<br />

trust data owners to ensure their confidentiality. In turn, opt out clauses, which<br />

are unavoidable if trust is low, reduce the value of the data produced.<br />

Existing European regulations allow (but do not require) Member States to<br />

grant access to microdata without the consent of the data subjects (which is<br />

typically the case for administrative data) when such data are essential for<br />

the pursuit of research and on the condition that they are de-identified. 3 Deidentification<br />

involves the removal of personal identifiers such as national IDs<br />

or names, but can also involve the removal or blurring of other quasi-identifiers<br />

such as the address or date of birth.<br />

De-identification does not necessarily remove all privacy concerns, however.<br />

Users of the data may be able to use combinations of variables (such as workplace<br />

and employment history to re-identify the individuals in the data). This<br />

risk of re-identification is heightened with linked microdata. Protocols need to<br />

be in place to ensure that confidentiality is preserved. These protocols regulate<br />

who can access the data and how this access is organized.<br />

Under European regulations, access is granted in two steps. First, the institution<br />

to which the researcher is affiliated needs to be recognized as a research<br />

institution. This is important because it is the institution that eventually guarantees<br />

that proper safeguards are in place and the data will remain confidential.<br />

Second, access is only granted on a project-by-project basis. Each project (data

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!