Data privacy & security
personal data (de: personenbezogene Daten):
‘personal data’ means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person; (Source)
Personal data can be pseudonymized or anonymized.
‘pseudonymisation’ means the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organisational measures to ensure that the personal data are not attributed to an identified or identifiable natural person; (Source)
Only if personal data are properly anonymized, they do not fall within the scope of the GDPR. However, requirements for anonymization are high:
Overall, it is very hard to properly anonymize data. Most of the times that people speak of "anonymized" data they are still pseudonymized data in the sense of GDPR and hence are still subject to the regulation.
non-personal data (de: nicht-personenbezogene Daten): for example, data on organization processes, data on institutions etc.
open data (de: offene Daten):
Open data is data that can be freely used, re-used and redistributed by anyone - subject only, at most, to the requirement to attribute and sharealike. (https://opendatahandbook.org/guide/en/what-is-open-data/)
Depending on the project, a declaration on data security needs to be signed by all members of the project team and the NPO.
You can download it here. It should be adapted according to the specific requirements of the project that should've been defined in the ideation process. The project lead is responsible for collecting the signed declarations from all project team members before any data is shared as part of the onboarding process.
Depending on the project, the project lead and the project team need to ensure that the data is stored encrypted on their local machines.
There are two ways to achive this goal: by encrypting the user's home folder or by using VeraCrypt.
VeraCrypt is an encryption program and the successor of TrueCrypt. With the help of VeraCrypt, encrypted containers can be created. To decrypt ( called “to mount” ) the container, a password is needed. The encrypted (“mounted”) VeraCrypt container will then appear as a new drive on the computer. All data stored on this drive is automatically encrypted. Programs can still access this data, because they are encrypted in memory. The storage space of this virtual drive is determined by the size of the container. Once created, the size of the container can no longer be adjusted. The project lead must therefore estimate the amount of data that will be stored when creating the container.
The project data must always be encrypted so that they cannot be read by unauthorized third parties if the data medium is lost. One way to ensure this is an encrypted home directory. The data is then decrypted or encrypted automatically when the user logs in or out. Whether the encryption of the home directory is possible depends on the operating system the project team member uses.
Windows: An encryption of the home directory is only possible in Windows Pro and Enterprise. Windows users must fall back therefore usually to the solution with VeraCrypt (previous section).
Mac: On Mac OS, starting with Mac-OS X 10.4, FileVault can be used to encrypt the home directory and also the entire hard disk. Caution with the latter. If you forget or lose both your user password and the recovery password, your data is irretrievably lost (encrypted). Instructions for FileVault can be found here. Important: If you are using TimeShift to make backups, the folder you created for CorrelAid should be excluded from the backup or encrypted.
Linux: In the newer versions of the most common distributions you should be able to select encryption as an additional option when creating a new user account. In most cases the software ecryptfs-utils is used for encryption. If you missed to do this for your user account, you should fall back to the VeraCrypt option.