Applying data security and encryption techniques according to data governance guidelines |
Identifies data that may be considered personally identifiable information (PII), sensitive personal information (SPI), or otherwise needing extra security considerations. |
Recognizing legal and ethical ramifications of data protection during data collection |
Identifies examples of various power imbalances in humanitarian response situations. |
Developing a data collection plan for a needs assessment |
Describes characteristics, advantages, and risks of common data collection techniques. Identifies and defines what data needs to be collected for a needs assessment and where to obtain it. Identifies/flags when requested primary data may be available as secondary data (that is, when effort of primary data collection may not be necessary). |
Designing a survey |
Evaluates a survey for good design (for example, use of constraints, survey logic, etc.) to ensure it supports good data. Describes how good survey design, training, and tools can help mitigate various issues. Demonstrates sensitivity to cultural, socio-economic, and other differences around “acceptable” data and provides examples of how to rephrase questions to make them more contextually- acceptable. |
Preparing for and conducting mobile data collection |
Follows step-by-step guidance to design a simple data collection form. Makes simple adjustments in a pre-existing form (for example, modify question phrasing, change options in a list of choices for a select question). Performs basic functions using data collection software. Uses a variety of resources (for example, informal networks, technical documentation, web forums, etc.) to troubleshoot technical issues with data collection software. Follows a to-do checklist to prepare devices for a field deployments. Loads forms to phones. Identifies ways to extend device battery life during surveying (for example, reduce screen brightness, turn off Wifi and bluetooth, etc.). |
Monitoring and evaluation |
Describes when, why and how to implement common relief monitoring tools such as post-distribution monitoring (PDM), on-site observation forms and exit interviews. Provides examples of common types of evaluations/reviews used during response operations and describe when they are relevant (real-time evaluation (RTE), After Action Reviews, joint evaluations, etc.). |
Integrating secondary data into data collection plan |
Provides examples of common sources of secondary data and methods for finding them (for example, census, news reports). Finds and describes how to use common operational datasets (CODs). |
Collecting GIS and remotely sensed data |
Outlines the considerations around the collection and use of GPS coordinates (example, implications of GPS accuracy). Describes the basics of collecting GPS (for example, requires an unobstructed view of the sky, accuracy limitations, etc.). |
Procuring satellite imagery |
Recognizes the steps involved in producing satellite imagery. |