Data Storage and Privacy Practices

Modèles de prompts IA

Copiez un prompt dans Claude, ChatGPT ou Gemini. Collez votre document en bas et exécutez.

Collez un document pour obtenir une évaluation de qualité notée, avec preuves et priorités de révision.

5,615 caractères
You are an expert in data protection and privacy for M&E and research projects. Score the data storage and privacy section of the document I will provide using the rubric below. The section may be embedded in a methodology, inception report, ethics chapter, or standalone data management plan. The goal is to assess whether the practices are operational and compliant rather than aspirational.

SCORING RUBRIC - Data Storage and Privacy Practices
Score each dimension 1-5 using these criteria:

DIMENSION 1: Storage Location and Access
- Score 5: Storage location is named specifically (platform, server, cloud region, or device class) with security characteristics. Access controls are documented: who is authorized, by name or role; how authorization is granted; how authorization is revoked when staff leave or change roles; whether access is logged. Differential access by role is described (collector vs. analyst vs. PI).
- Score 4: At least three of four elements present. Storage location and access list clear; revocation or logging partial.
- Score 3: Storage referenced but not specified. Access controls described in principle but not operationalized. Revocation absent.
- Score 2: Generic statement that data will be stored securely. No platform, no access list, no revocation.
- Score 1: No storage or access information.

DIMENSION 2: Identifier Handling
- Score 5: The approach to PII is fully described. Anonymization or pseudonymization is specified at the relevant stages (collection, analysis, reporting). Direct identifiers are stored separately from response data with a documented key-handling protocol. The conditions and authorization for re-identification (if any) are stated. Quasi-identifier risks (e.g., small populations, rare combinations) are addressed in analysis and reporting.
- Score 4: At least three of four elements present. Separation and anonymization are clear; re-identification conditions or quasi-identifier handling partial.
- Score 3: Anonymization mentioned but not operationalized. Identifier separation not described. Quasi-identifier risk unaddressed.
- Score 2: Identifiers and PII referenced in passing. No anonymization plan, no separation.
- Score 1: No identifier handling described.

DIMENSION 3: Transfer Security
- Score 5: Every data transfer in the lifecycle is described and secured. Collection-to-storage transfer is encrypted in transit (named protocol or service). Storage-to-analysis transfer is on authorized channels with encryption. Transfer between team members uses approved tools only. Insecure transfer (personal email, consumer messaging, unencrypted USB) is explicitly prohibited. Transfer between organizations is governed by a data sharing agreement.
- Score 4: At least three of four elements present. Encryption and approved channels named; one transfer step or prohibition is partial.
- Score 3: Transfer security mentioned in principle. Encryption referenced but channels not named. Inter-org transfer not addressed.
- Score 2: Generic statement that transfers will be secure. No protocols, no channels, no prohibitions named.
- Score 1: No transfer security described.

DIMENSION 4: Retention and Destruction
- Score 5: Retention timeline is stated for each data category (raw data, cleaned data, identifiers, derived outputs). Destruction approach is described (secure deletion, certificate of destruction, physical destruction of media). The responsible party for destruction is named. A verification mechanism (sign-off, log entry) is named. Where retention is required by donor or legal mandate, the source is cited.
- Score 4: At least three of four elements present. Timeline and destruction approach clear; responsible party or verification partial.
- Score 3: Retention timeline mentioned but not differentiated by data type. Destruction approach generic. Responsibility unclear.
- Score 2: Generic statement that data will be retained or destroyed appropriately. No timeline, no method.
- Score 1: No retention or destruction information.

DIMENSION 5: Compliance Framework
- Score 5: The applicable data protection regime is named (e.g., GDPR, UK GDPR, country-specific data protection law, donor data policy, organizational policy). Specific requirements from the named regime are tied to the practices above (e.g., legal basis for processing, data subject rights process, cross-border transfer rules, data protection officer or focal point). Where multiple regimes apply, the relationship between them is stated.
- Score 4: At least three of four elements present. Regime named and tied to practices; cross-border or focal point partial.
- Score 3: Compliance referenced generically ("we will comply with data protection law") without naming the regime or specific requirements.
- Score 2: No applicable regime named. Compliance asserted without a framework.
- Score 1: No compliance framework described.

OUTPUT FORMAT:
Return your assessment as a table followed by a summary:

| Dimension | Score (1-5) | Evidence | Priority Revision |
|-----------|-------------|----------|-------------------|
| Storage Location and Access | | | |
| Identifier Handling | | | |
| Transfer Security | | | |
| Retention and Destruction | | | |
| Compliance Framework | | | |

**Total: X/25**
**Band:** Strong (22-25) / Adequate (17-21) / Needs Revision (11-16) / Substantial Revision (5-10)
**Single Most Important Revision:** [One specific sentence]

For any dimension scored 1 or 2, add a brief explanation and a concrete revision example.

DATA STORAGE AND PRIVACY SECTION TO SCORE:
[Paste your data storage and privacy section here]

Scoring Criteria

Storage Location and Access
5Excellent

Storage location named specifically. Access list documented. Authorization grant and revocation procedures defined. Access logging in place. Differential access by role described.

4Good

At least three of four elements. Storage and access list clear; revocation or logging partial.

3Adequate

Storage referenced but not specified. Access controls in principle, not operationalized. Revocation absent.

2Needs Improvement

Generic "stored securely" statement. No platform, no access list.

1Inadequate

No storage or access information.

Identifier Handling
5Excellent

Anonymization or pseudonymization specified by stage. Identifiers stored separately with key-handling protocol. Re-identification conditions stated. Quasi-identifier risk addressed.

4Good

At least three of four elements. Separation and anonymization clear; re-id conditions or quasi-id partial.

3Adequate

Anonymization mentioned, not operationalized. No separation. Quasi-id risk unaddressed.

2Needs Improvement

Identifiers referenced in passing. No plan, no separation.

1Inadequate

No identifier handling described.

Transfer Security
5Excellent

Every transfer described and secured with named protocols, approved channels, prohibitions on insecure tools, and inter-org data sharing agreement.

4Good

At least three of four elements. Encryption and channels named; one step or prohibition partial.

3Adequate

Transfer mentioned in principle. Encryption referenced but channels not named. Inter-org not addressed.

2Needs Improvement

Generic statement that transfers will be secure. No protocols, no channels.

1Inadequate

No transfer security described.

Retention and Destruction
5Excellent

Per-data-category timeline. Destruction approach described. Responsible party named. Verification mechanism in place. Legal or donor mandates cited where applicable.

4Good

At least three of four elements. Timeline and destruction clear; responsible party or verification partial.

3Adequate

Timeline not differentiated by data type. Destruction generic. Responsibility unclear.

2Needs Improvement

Generic "retained or destroyed appropriately" statement. No timeline, no method.

1Inadequate

No retention or destruction information.

Compliance Framework
5Excellent

Applicable data protection regime named. Specific requirements tied to practices. Cross-border or focal point addressed. Relationship between multiple regimes stated.

4Good

At least three of four elements. Regime named and tied to practices; cross-border or focal point partial.

3Adequate

Compliance referenced generically without naming regime or requirements.

2Needs Improvement

No applicable regime named. Compliance asserted without framework.

1Inadequate

No compliance framework described.

Score Interpretation

Total (out of 25)BandNext Step
22-25StrongStorage and privacy practices are operational and compliant. Approve with minor refinements.
17-21AdequateAddress flagged dimensions before fielding. Most likely fix: name the compliance regime and specify retention timelines per data category.
11-16Needs RevisionSubstantial revision required. Use Revise prompt to operationalize storage, transfer, and retention before any data collection.
5-10Substantial RevisionPractices fail the threshold for data protection. Rebuild starting with the applicable compliance regime and a specific platform and access architecture.