🔒 Interactive Tool

Data Collection Protocol Builder

Design ethical, privacy-first data collection systems. Apply data minimization, ensure informed consent, and protect beneficiary privacy. Generate collection protocols and consent templates.

⚠️ Privacy-First Data Collection

Before collecting any data, ask:

  • Do we actually need this? Only collect data essential for program delivery or required reporting.
  • Do we have consent? People must understand what data is collected and how it's used.
  • Can we protect it? Have security measures in place before collecting sensitive information.
  • Can we minimize it? Use aggregate data, anonymization, or ID numbers instead of names when possible.
  • Will we delete it? Plan for data retention limits and secure deletion.

Default to collecting less data, not more. Excessive data collection creates privacy risks and maintenance burden.

Step 1: Define What Data You Actually Need

Select only the data points essential for your program. Every piece of data creates privacy risk and maintenance burden.

Select Data Categories

Click items to add to your collection protocol. Items marked with ⚠️ require extra privacy protections.

👤 Identification
ID Number (anonymous)
Full Name ⚠️
Age
Gender
📍 Location
District/Region
Village/Community
Specific Address ⚠️
GPS Coordinates ⚠️
📱 Contact
Phone Number ⚠️
Email Address ⚠️
📏 Anthropometrics
Height/Length
Weight
MUAC
🏥 Health
Medical History ⚠️
Disability Status ⚠️
HIV Status ⚠️
🏠 Household
Household Size
Number of Children
Household Income ⚠️

Selected Data Points (0)

Step 3: Define Security & Privacy Measures

How will you protect the data you collect?

Security Checklist

Your data protection plan must include:

  • Secure physical storage for paper forms (locked cabinets/rooms)
  • Password protection for all digital files
  • Encryption for sensitive data
  • Access controls (only authorized staff)
  • Regular backups (with same security as primary data)
  • Secure deletion procedures
  • Data breach response plan
  • Staff training on data protection
  • No data stored on personal devices
  • No sharing via insecure channels (email, WhatsApp)

Step 4: Your Data Collection Protocol

Review your protocol and export templates for use in the field.