Not fit for Purpose: A critical analysis of the 'Five Safes'

11/04/2020
by   Chris Culnane, et al.
0

Adopted by government agencies in Australia, New Zealand and the UK as policy instrument or as embodied into legislation, the 'Five Safes' framework aims to manage risks of releasing data derived from personal information. Despite its popularity, the Five Safes has undergone little legal or technical critical analysis. We argue that the Fives Safes is fundamentally flawed: from being disconnected from existing legal protections and appropriation of notions of safety without providing any means to prefer strong technical measures, to viewing disclosure risk as static through time and not requiring repeat assessment. The Five Safes provides little confidence that resulting data sharing is performed using 'safety' best practice or for purposes in service of public interest.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/18/2021

Data Protection Impact Assessment for the Corona App

Since SARS-CoV-2 started spreading in Europe in early 2020, there has be...
research
09/02/2023

Data Repurposing through Compatibility: A Computational Perspective

Reuse of data in new contexts beyond the purposes for which it was origi...
research
05/13/2020

A vision for global privacy bridges: Technical and legal measures for international data markets

From the early days of the information economy, personal data has been i...
research
08/18/2022

Understanding the Implementation of Technical Measures in the Process of Data Privacy Compliance: A Qualitative Study

Modern privacy regulations, such as the General Data Protection Regulati...
research
10/05/2017

Civil Asset Forfeiture: A Judicial Perspective

Civil Asset Forfeiture (CAF) is a longstanding and controversial legal p...
research
06/02/2023

Reconciling Governmental Use of Online Targeting With Democracy

The societal and epistemological implications of online targeted adverti...
research
06/28/2019

Safeguarding the Evidential Value of Forensic Cryptocurrency Investigations

Analyzing cryptocurrency payment flows has become a key forensic method ...

Please sign up or login with your details

Forgot password? Click here to reset