Technical Competency
Confidentiality and Information Protection
Deep Dive
The following table includes a list of required elements for demonstrating Confidentiality and Information Protection and examples of statements or behaviours which suggest need for further development in this competency. This deep dive addresses separately each element of knowledge, demonstrated skills and attitudes/approaches which together make up this competency.
Knowledge, recommending what someone should understand and be able to explain and examples of statements or behaviours which indicate a need for further development.
Demonstrated skills, recommending skills expected for everyone, those specific to programming roles and those specific to roles involving survivor interaction. Examples of behaviours which indicate the need for further development included as well.
Attitudes or approaches (linked to Core Values), which help identify associated values and attitudes, as well as examples of attitudes or approaches which indicate the need for further development.
Key Murad Code Provisions for this Technical Competency
Principles 9 (Take the Time, Create the Space) and 10 (Ensure Respectful and Safe Interactions)
2.3 Survivor control over their information
4.9 Information-sharing
7.8 Build confidentiality protections
9.4 Ensure privacy
Closely associated with technical competencies Informed Consent, Risk Recognition and Responsible Use of Information
KNOWLEDGE: understands and can explain…
Elements expected for all roles
Examples of statements or behaviours which indicate the need for further development
The central importance of confidentiality and information protection to security and safety, trust, privacy, integrity of work and many other aspects of survivor-centred, trauma-informed approaches
What types of information are sensitive and require confidentiality and information protection measures
Main/common threats to information protection and confidentiality (internal/external) in relevant contexts during collection, transit, holding and sharing/use, including the risks of communication through digital and other formats including cloud-based storage, analysis and translation software and programs, AI tools, etc [MC 5.3, 7.8]
Main types of risk mitigation and information protection measures for each of the main threats/risks [MC 5.3, 7.8]
The principle of data minimisation and basic common principles of other relevant data protection laws which apply in all relevant contexts (where collected, where in transit, where held – physical and electronically on server, where use and share) [MC 4.10, 6.7]
National laws relating to access to or handling of information including police and judicial powers, mandatory reporting, handling of different types of information and personal data (including images depicting sexual violence or child abuse), which apply in all relevant contexts (where collected, where in transit, where held – physical and electronically on server, where used and shared) [MC 4.10, 6.7]
Telling family and friends about their work experiences including survivor interactions
Talking about work on public transport, airports or in taxis
Conducting interviews or work on confidential material in public places
Not distinguishing between different types of information
Logging on to public WIFI in airports, hotels, etc. with devices holding work or confidential information
DEMONSTRATED SKILLS: can demonstrate how to…
Expected for all roles
Specific to programming (designing and delivering SCRSV programming)
Specific to survivor interaction roles (direct interaction with survivor to gather information)
Examples of behaviour which indicate a need for further development
Handle confidential information safely and confidentially
Deidentify/redact written information or statements (including understanding ‘mosaic’ or cumulative information identification), including the use of codes, pseudonyms and other identity protection measures in all files, notes, storage and use
Communicate confidentially in that context
Ensure clear, accurate and updated record and tracking of informed consent related to information
Assess information risks (including evaluating contextual factors) and determine appropriate risk mitigation and protection measures to adequately address those risks in all relevant contexts
Define, designate and communicate which types of programme information are to be treated as confidential
Develop protocols to inform approach to national laws which limit confidentiality or may allow access to information and when not to collect information if it cannot be handled confidentially
Design and implement methodology which protects, removes, minimises or separates confidential information from work records.
Design, resource, implement, regularly review and monitor effective information management and protection protocols for all aspects of activities which ensures information can be collected, transported/ transferred, held, used or shared confidentially in all relevant contexts for programming (with expert advice when needed)
Create a restricted access and monitoring system for confidential information
Designate clear responsibilities and tasks for team in terms of information management and protection
Test systems and monitor implementation of protocols and measures
Create an effective reporting and response system for confidentiality and privacy breaches
Vet partners or potential receivers of information for information protection and ability to uphold confidentiality
Contact and communicate with survivors remotely or in person to uphold confidentiality, privacy and discretion
Discuss privacy and confidentiality, information protection with survivors, including honestly describing any limitations or risks
Implement measures effectively to protect survivor information, privacy and safety
Maximise privacy and confidential protections before, during and after information collection [MC 7.8, 9.4]
Accurately record informed consent to ensure all future handling and use is based on that consent
Conducting interviews in IDP camps in tents, rooms or other locations where they can be overheard
Not taking measures to prevent colleagues or others walking into the interview/meeting room
Taking photos of survivors on mobile phone cameras or recording or saving statements on their personal phone
Not separating personal from work content on their personal devices
Sending confidential information in unprotected email attachments
Collecting information without or before protection protocols and systems are in place
Breaching confidentiality and privacy of a survivor
Attitude and Approach
Associated Values
Examples of attitudes or approaches which indicate need for further development
Core Values: Commitment and Responsibility
Other Values: Integrity, Honesty
Approach:
Takes confidentiality and privacy extremely seriously and takes care to comply with and implement information protection, confidentiality and privacy protocols and measures
Forgoes the intended collection, sharing or use of information, if risks are too high, and adequate mechanisms are lacking to manage the information safely and confidentially (paraphrased from the ICRC Protection Framework)
Complacency about information management and communication protocols.
Sharing confidential information without considering informed consent.
Taking no action on suspected breach of protection measures/system or leak of confidential information

