Skip to main content
Home
About
Sitemap
About the guide
What is statistical data integration?
Key features of the Commonwealth arrangements
A process map for data integration projects
Glossary
FAQs
Contact Us
Project application
Project proposal
Project proposal template
In principle approval
Appoint an integrating authority and assess project feasibility
Finalise project details
Outsourcing or working in partnership
Final approval
Project delivery
Extract and transfer data
Preparing for linking
Linking and merging of data
Access to integrated data
Analysis of integrated data
Evaluation and project completion
Roles and responsibilities
Data custodians
A checklist for data custodians
Integrating authorities
A checklist for integrating authorities
A protective policy environment
Drafting project agreements
Project agreements - Data custodians and integrating authorities
Project agreements - Integrating authorities and data users
Sample agreements
Manage datasets for the duration of data integration projects
Technical infrastructure and expertise
Technical resources for integrating authorities
Transparency in operations
Data users
A checklist for data users
Topics
Scope of the Commonwealth Arrangements
Risk framework
Legal and policy considerations
Authorisation to release identifiable data
Examples of legislated authorisation
Human Research Ethics Committee Approvals
Informed consent
Public Interest Determinations
Privacy Act 1988
Privacy Impact Assessments
Protections prohibiting disclosure of identifiable data
Accreditation
Applying for accreditation
Criterion I – Ability to ensure secure data management
Criterion II – Demonstrate safe data access
Criterion III – Availability of appropriate skills
Criterion IV – Appropriate technical capability
Criterion V – Lack of conflict of interest
Criterion VI – Culture and values
Criterion VII – Transparency of operation
Criterion VIII – Existence of an appropriate governance and administrative framework
The separation principle
Separation principle: Approach 1 (external separation)
Separation principle: Approach 2 (internal separation)
Data security
Information and communication technology security
Personnel security
Physical security
Data management
Confidentialising data
Data quality
Quality assurance
Providing metadata
Data breaches
Resources
About-2.png
About-2.png