⚠️ Privacy-First Data Collection
Before collecting any data, ask:
- Do we actually need this? Only collect data essential for program delivery or required reporting.
- Do we have consent? People must understand what data is collected and how it's used.
- Can we protect it? Have security measures in place before collecting sensitive information.
- Can we minimize it? Use aggregate data, anonymization, or ID numbers instead of names when possible.
- Will we delete it? Plan for data retention limits and secure deletion.
Default to collecting less data, not more. Excessive data collection creates privacy risks and maintenance burden.
Step 1: Define What Data You Actually Need
Select only the data points essential for your program. Every piece of data creates privacy risk and maintenance burden.
Select Data Categories
Click items to add to your collection protocol. Items marked with ⚠️ require extra privacy protections.
Selected Data Points (0)
Step 2: Design Informed Consent Process
Ensure people understand what data you're collecting and how it will be used.
Consent Checklist
Your consent process must include all of these elements:
- Explain what data is being collected in plain language
- Explain why you need this data and how it will be used
- Explain who will have access to the data
- Explain how long data will be kept
- Explain security measures to protect data
- Confirm participation is voluntary and can be withdrawn
- Explain what happens if they withdraw (data deleted)
- Provide contact information for questions or complaints
- Offer translation into local language(s)
- Allow time for questions before signing
Step 3: Define Security & Privacy Measures
How will you protect the data you collect?
Security Checklist
Your data protection plan must include:
- Secure physical storage for paper forms (locked cabinets/rooms)
- Password protection for all digital files
- Encryption for sensitive data
- Access controls (only authorized staff)
- Regular backups (with same security as primary data)
- Secure deletion procedures
- Data breach response plan
- Staff training on data protection
- No data stored on personal devices
- No sharing via insecure channels (email, WhatsApp)
Step 4: Your Data Collection Protocol
Review your protocol and export templates for use in the field.