Scoring Criteria
Storage location named specifically. Access list documented. Authorization grant and revocation procedures defined. Access logging in place. Differential access by role described.
At least three of four elements. Storage and access list clear; revocation or logging partial.
Storage referenced but not specified. Access controls in principle, not operationalized. Revocation absent.
Generic "stored securely" statement. No platform, no access list.
No storage or access information.
Anonymization or pseudonymization specified by stage. Identifiers stored separately with key-handling protocol. Re-identification conditions stated. Quasi-identifier risk addressed.
At least three of four elements. Separation and anonymization clear; re-id conditions or quasi-id partial.
Anonymization mentioned, not operationalized. No separation. Quasi-id risk unaddressed.
Identifiers referenced in passing. No plan, no separation.
No identifier handling described.
Every transfer described and secured with named protocols, approved channels, prohibitions on insecure tools, and inter-org data sharing agreement.
At least three of four elements. Encryption and channels named; one step or prohibition partial.
Transfer mentioned in principle. Encryption referenced but channels not named. Inter-org not addressed.
Generic statement that transfers will be secure. No protocols, no channels.
No transfer security described.
Per-data-category timeline. Destruction approach described. Responsible party named. Verification mechanism in place. Legal or donor mandates cited where applicable.
At least three of four elements. Timeline and destruction clear; responsible party or verification partial.
Timeline not differentiated by data type. Destruction generic. Responsibility unclear.
Generic "retained or destroyed appropriately" statement. No timeline, no method.
No retention or destruction information.
Applicable data protection regime named. Specific requirements tied to practices. Cross-border or focal point addressed. Relationship between multiple regimes stated.
At least three of four elements. Regime named and tied to practices; cross-border or focal point partial.
Compliance referenced generically without naming regime or requirements.
No applicable regime named. Compliance asserted without framework.
No compliance framework described.
Score Interpretation
| Total (out of 25) | Band | Next Step |
|---|---|---|
| 22-25 | Strong | Storage and privacy practices are operational and compliant. Approve with minor refinements. |
| 17-21 | Adequate | Address flagged dimensions before fielding. Most likely fix: name the compliance regime and specify retention timelines per data category. |
| 11-16 | Needs Revision | Substantial revision required. Use Revise prompt to operationalize storage, transfer, and retention before any data collection. |
| 5-10 | Substantial Revision | Practices fail the threshold for data protection. Rebuild starting with the applicable compliance regime and a specific platform and access architecture. |