Responding to data requests
This guide outlines the key steps and considerations to take when responding to data requests.
Please note:
- Data requests for sensitive data are assessed against relevant legislation, policies and agreements with other partner agencies, to determine if the data can be lawfully disclosed.
- Engagement with legal, information and privacy experts may be needed to help decide on the data request.
- There are no specific timeframes for considering a request. Data providers should acknowledge data requests and engage with the requestor to manage expectations.
We have compiled a list of questions you need to consider when reviewing data requests.
| Questions to consider | Recommended actions to take |
| Data request information | |
| If request is from a NSW government sector agency, note that the requested data is shared under the Data Sharing Act. If the request is from outside NSW government, assess the request against relevant compliance requirements of any relevant legislation such as:
Apply the Five Safes Framework to guide your assessment. |
| If yes, check availability of the requested data. If not, inform the requestor that your agency does not have the requested data. |
| If the data is publicly available, confirm that the requestor may use the data for their purpose. If the data can be made publicly available, inform the requestor of where to access the data. If the data is restricted, identify and document your agency’s requirements to fulfill the data request. |
| If yes to confidential or commercial-sensitive information, check and comply with the terms of the agreement or contract. If yes to personal and/or or health information:
|
| If yes, follow your agency's approval process. If not, inform the requestor regarding:
|
| Authority to decide on the data request | |
| If yes, identify and check with the data owner if they know of any restrictions or barriers in sharing the requested data. If not, check if your agency is permitted to share data under:
If unsure, check your agency's information asset register or data catalogue to locate the data owner within your agency. Talk to your agency's information and subject matter experts to find and verify ownership of the requested data. |
| If yes, determine which legislation permits data sharing. If not, contact the requesting agency (Requestor) for additional information. |
| a. Data Sharing Act:
b. GIPA Act
c. PPIP Act and HRIP Act
d. Public Interest Direction or Privacy Codes of Practice
e. State Records Act
|
| If yes, follow your agency's approval process. Communicate to the requestor information about the approval process and the status of the request. If not, check your agency's information asset register or data catalogue to identify the data owner, data custodian or the business system owner. If not and you are the data custodian or data owner or business system owner:
|
| Readiness to share data | |
| If yes, take note of details and confirm with the requestor. If not, liaise with the requestor to address any gaps. |
| If yes, get confirmation and make a record of it. If not, document and confirm roles and responsibilities with the requestor and within your agency. |
| If yes, provide the required metadata or data quality statement to the requestor. If not, document the metadata or write a data quality statement. You can use the Data Quality Reporting Tool to produce a data quality statement. |
| If yes, confirm with the requestor. Communicate if there are any costs associated with sharing the data. If not, inform the requestor and identify the barriers and possible solutions. |
Document any potential barriers and risks or issues that could arise from sharing data. Engage with the requestor to find solutions to mitigate risks.
Use the Five Safes Framework to guide you with your assessment of the data request.
Decisions around whether data should be shared should involve an evaluation of the risks involved with sharing the data. Use the Five Safes Framework to guide you with your decision.
Once a decision is made to approve or refuse the data request, your agency should provide a written statement of reasons for the decision.
Approve the request
Below is a list of considerations or actions to take when you decide to approve the data request.
- Identify the type of legal agreement you will need to share data. There are multiple types of agreements such as:
| Description | Suited for | |
| Data Sharing Agreement (DSA) | DSAs identify the parameters which govern the collection, transmission, storage, security, analysis, re-use, archiving and destruction of the data. | establishing long-term data sharing relationships that may involve:
|
| Memorandum of Understanding (MoU) | An MoU is a written agreement outlining the framework or key terms and conditions. It is not legally binding. | ongoing transfers that have consistent and formalised parameters. |
| Statement of Work (SoW) | The SoW is a document that provides detailed overview of the project, specifically the roles and responsibilities of the people working on the project. Information about the use, access and storage are included. | once-off data sharing with the requestor. |
- Communicate to the requestor that their data request is approved. Let them know if an in-principle approval is sufficient or if an agreement is needed.
- Negotiate with the requestor for the terms and conditions. When negotiating:
- Confirm project scope, objectives and outcomes.
- Confirm data format, data variables, frequency and timeframe, and the platform or mechanism for data transfer or access
- Agree an estimated timeframe for completion of the Data Sharing Agreement, building in time for internal reviews by legal officers, key stakeholders and decision-makers.
- Confirm whether any additional consultation is needed within or external to the agency before a Data Sharing Agreement can be finalised.
- Apply the Data Sharing Principles to ensure you have the appropriate controls in place to safely share data.
Refuse the request
- Make a record that documents the reasons why your agency is refusing to fulfill the data request.
- Inform the requestor of your agency's decision in writing.
Note: The reasoning for a final decision not to share data needs to be established in writing. Note that if the requestor disputes your reasons for not approving a request the requestor is able to make a formal access application under the GIPA Act.
Your agency can set terms and conditions for the release of data to the requestor to ensure that controls are in place on:
use of the data
the environment the data will be stored
the publication of outputs from the data.
When sharing data, it is important that the parties involved enter into an arrangement via an agreement.
Below are components you need to consider when entering into an agreement.
| Examples of information and/or clauses | ||||||||||||||||
Parties to the agreement Drafting notes: Specify agencies and names of authorised persons who are entering into the agreement, i.e. the data provider(s) and the data recipient. |
| |||||||||||||||
Purpose Drafting notes: Include information on:
| Purpose Data is provided for the purposes of [state the purpose of the data sharing].
Acknowledgement: | |||||||||||||||
Term and variation of agreement Drafting notes: Specify:
| Term and variation of agreement The agreement starts on [start date] and ends on [end date]. This agreement will be reviewed [expected interval date, e.g. every 6 months, annually, every 3 years, etc.]. The data will be provided on ongoing basis until [agreement end date] Both parties must agree in writing to vary this agreement. | |||||||||||||||
Details of data to be shared Drafting notes: Provide a brief description of the data to be shared. Include as much information as possible about the data. Include data specifications or data quality statements or data dictionaries as part of the agreement. | Details of data to be shared The Data Provider will supply [name of the dataset], with the following parameters:
| |||||||||||||||
Approvals required Drafting notes:
| Approvals required Data will be provided subject to: (select all options that apply): | |||||||||||||||
| Conditions of sharing | ||||||||||||||||
Use of data Drafting notes: Include clauses relating to:
| Use of data The Data Recipient agrees it will:
The Data Recipient will not:
| |||||||||||||||
Access to Data Drafting notes: Specify
| Access to Data The Data Provider agrees to make the Shared Data available via [method of data access, e.g. API, secure File Transfer Protocol or online file sharing service] for the agreed term. The parties may agree to make changes to the data scope as follows:
| |||||||||||||||
Licence, copyright and intellectual property Drafting notes: Include details of:
| Licence, copyright and intellectual property The Data Provider grants to the Data Recipient a non-exclusive, non-transferable, royalty free licence to use, reproduce and adapt the Shared Data for the Approved Purposes (on the terms, and subject to the restrictions, set out in this Data Sharing Agreement). | |||||||||||||||
Storage and security Drafting notes Specify your storage and security requirements. Include information on:
| Storage and security The Data Recipient will store the Shared Data [name of the approved storage and provide further details relating to security measures in place] Data provided by [Data Provider] to [Data Recipient] will be removed or destroyed by the [Data Provider] in compliance with the provisions of the State Records Act 1998 [or other relevant legislation.] The [Data Recipient] will notify [Data Provider] when data is removed or destroyed. Data provided under this Agreement will be retained or destroyed based on the information provided in the below table.
| |||||||||||||||
Data Breach Drafting notes: Specify the data breach notification process. | Data Breach The [Data Recipient] will immediately notify [Data Provider] if it becomes aware of any unauthorised access to, or use or disclosure of, any data, including the steps the [Data Recipient] is taking to remedy the data breach. | |||||||||||||||
Termination Drafting notes: Include information on circumstances where the data sharing agreement may be terminated. | Termination Either Party may terminate by giving [X] days written notice to the other Party for any reason or for a specified reason, or to terminate without notice if there has been a serious privacy or data breach. | |||||||||||||||
Before you share data, check that the data does not contain:
- Information which may identify an individual or community
- commercial-sensitive or confidential information
- any data that could trigger, create or contribute to a threat, issue, breach or vulnerability.
Let the requestor or data recipient know if you are intending to do the following as part of your data preparation:
- Remove or modify personal identifiers such as a person’s name, address and date of birth as an essential component of de-identification.
- Combine information or data that is likely to enable identification of an individual into categories. For example, age could be combined and expressed in ranges, like ‘age range: 25-39’, rather than in a single year like ‘age: 27’.
- Manufacture ‘synthetic data’, which can be generated from original data and then substituted for it, while preserving some of the patterns contained in the original data. This removes any personal or sensitive information, while allowing general conclusions or insights to be released.
- Introduce small amounts of random error, e.g. rounding or swapping data between records. This could include swapping modified identifying information for one person with the information for another person with similar characteristics to prevent the release of unique personal information.
- Suppress data to ensure identifying or sensitive data is not released. For example, you may want to redact commercially sensitive figures or company names. Data suppression may impair the utility of a dataset so design data suppression methods with care.
- Alter identifiable information in a small way such that the aggregate information or data is not significantly affected but the original values cannot be known with certainty.
- Remove / encrypt / modify quasi-identifiers that are unique to an individual or that in combination with other of unique or remarkable characteristics (profession, significant dates etc), are reasonably likely to identify an individual.
- Remove names and attach a coded reference or pseudonym to each record. This will allow data to be released without the individual being identified. The same coded reference should always be replaced by the same matching pseudonym to allow data insights to be maintained. With pseudonymisation, it is important to ensure that other publicly accessible data, such as electoral roll data, cannot be used to reintroduce the names that have been removed from the dataset.
- Aggregate or display data as totals rather than individual values, so no data relating to or identifying any individual is shown. Small numbers in totals are often suppressed through ‘blurring’ or by being omitted altogether.
- You can reduce the risk to privacy when publishing spatial information by:
- increasing a mapping area to cover more properties or occupants
- reducing the frequency or timeliness of publication, so that it covers more events, is harder to identify a recent case, or does not reveal additional data such as time or date of an event
- removing the final ‘octet’ on IP addresses to degrade the location data they contain
- using formats, such as heat maps, that provide an overview without allowing the inference of detailed information about a place or person
- not publish spatial information at a household level.