top of page

Data Policies

Latitude Network takes data security, management and privacy very seriously. We can include bespoke data security requirements into our contracts with clients based on their needs. Download our Data Management Policy below which focuses on handling data provided by our clients to us to analyse on their behalf.

We also collect small amounts of data on our website to serve subscribers and members (our clients) with services, courses and project chat spaces. Download our website privacy policy here.

Data Management Policy

Our plain English Data Management Policy is outlined below. This policy relates to information we collect, store and analyse on behalf of our clients.

Information we receive - de-identified data

Latitude Network Pty Ltd consults with and provides data analytics services to a range of clients in the social services including not-for-profit organisations and government agencies. Information we collect, store and analyse on behalf of our clients is always de-identified information. That means we do not have the means to identify an individual from the data we manage - there are no names, addresses, phone numbers or email addresses contained in the data. Usually the data contains unique identifiers (random numbers that ‘stand in’ for an individual) that are not linked to identifiable information. We use controls and safeguards including data masking in the data access and storage environment to prevent identification or re-identification of data. The data we receive may also contain information collected by our clients or their partners such as survey results, usage of services, activities delivered and demographic information (such as gender and age).

Why we collect it and how we use it

Our Clients usually collect the data through their own data management systems which are covered by their privacy and consent policies with their clients. Clients then upload de-identified data to us using secure servers that are based in Australia. Most data is stored in our secure Azure data warehouse. For some services we may automate ingestion of data from client systems via APIs or other credentials. We then collect and store that information on behalf of our clients to assist them to understand their data, what outcomes they are achieving and how to improve their performance. Our overall purpose in using data is limited to helping social service organisations and governments improve performance and achieve better social outcomes. 
We never use any client’s data to conduct marketing activity to their clients (the beneficiaries of the services). We don’t receive, keep or use personal or contact data for the beneficiaries of client programs. We may share the aggregate analysis of data (e.g. averages for a group of people in dashboards or chart visualisations) with our clients with their permission, or in some cases high level data is shared with our client’s partners when it is requested/approved. We may also generate datasets on behalf of our clients and use machine learning techniques to analyse that data in order to demonstrate outcomes, understand what services work for which cohorts, or how social organisations can better manage their services for highest impact. All of that analysis is private and confidential to our clients, and they can then choose how they use it within their privacy policies. We don’t publish reports from our client work to public servers.

How we keep data secure

We keep data secure by a combination of secure technologies and best practices.
Any data provided by our clients is stored on servers located in Australia. 
Data provided to us will be stored in encrypted disks (“encrypted at rest”). Any movement of data will also be encrypted (“encrypted in transit”) and audit logs are maintained that track access to the data by users. This covers our central storage facility (from our service providers), external processing services (e.g. machine learning platforms) and any electronic device used by our analysts when accessing or working with data.
Clients share data with us only via our secure “drop-boxes”. No data is received, sent or kept in unencrypted form (e.g. email)  or physical form (e.g. removable or portable disks, printed media). Clients can’t access the data from our servers once it is uploaded.
We follow a “need to know'' principle when it comes to data access. Our data analysts are granted access to client data only when it is necessary to conduct work. No anonymous access is allowed. We make use of commercially reasonable best practices and technologies to ensure this. 

Keeping data de-identified

We work with clients to ensure data shared with us is already de-identified. Where practicable, this includes removing or altering any attribute that may allow someone to re-identify an individual (such as user IDs from database systems). In addition to this, data generalisation and grouping  takes place where data is expressed in summary form by grouping related values into categories or ranges. 
In the case where data containing identifying information may be accidentally uploaded to our systems, we remove it immediately, notify our client and work with them to prevent any recurrences.
In long-term projects where granular data is not strictly necessary, we only keep aggregated information. 

How we align to our clients data policies

We recognise our client’s role as the main controller of the datasets they provide to us.  We work with our clients to align to their data privacy policies where applicable.  
Upon termination of a service agreement, data is deleted from our systems, unless retention is required by post-agreement obligations.
Our service agreements regulate how we govern data for each client in accordance with the policies outlined in this document.

Data breaches

In the unlikely event that the data stored has been or has likely been the subject of misuse, interference, unauthorised access, modification (or loss), or unauthorised disclosure, we will notify our clients and work with them to assess the impacts and carry out mitigation actions. We maintain Cyber Insurance to cover legal advice, management and mitigation in the event of a data breach.

Applying the ‘Five Safes’ data confidentiality framework

Latitude Network adopts the principles in the ‘Five Safes’ data confidentiality framework, as promoted by Australian Governments. 

  1. Safe People

    1. Latitude Network restricts access to client data only to a single Director and data analysts working on that client project. No other Latitude Network staff have access to that client’s data.

    2. All staff sign client confidentiality agreements.

    3. We include client confidentiality clauses in our contracts for service with clients.

  2. Safe Projects

    1. All data analysis is conducted under a proposal with our client that specifies the purpose of the project. This purpose is agreed with our client prior to starting a project and the client gets internal approvals and is responsible to ensure that the purpose aligns with the organisation’s mission and policies.

    2. Latitude Network’s purpose with all use of client data is for a public benefit - to improve achievement of outcomes and increase the capability of organisations to deliver high performance social outcomes.

    3. We only provide our reports to our clients. The data is not used for regulatory or compliance purposes and is not provided to any other individual or organisation unless requested by our client in writing.

  3. Safe Settings

    1. We use an Australian-based server architecture with a provider used by many health and government departments, compliant with Australian Government data security requirements.

    2. Our system includes full version control, user access control, two-factor authentication, and full traceability of access.

    3. We only receive client data via a secure upload to this server, never via email or other insecure platform.

  4. Safe Data

    1. In general, we receive data uploads on a periodic or one-off basis for specific datasets. We do not receive access to live client databases - when we build dashboards for clients those are implemented internally to the organisation using their security management protocols.

    2. We group data at a granularity that obscures unit records; including aggregation of data as well as more advanced techniques.

    3. We delete client data that is no longer needed for a client project at the end of that project.

    4. We encourage our clients to adopt robust privacy policies and respectful data collection methods, and to provide easy access for their clients of their information.

  5. Safe Outputs

    1. Our reports go direct to our clients and are not shared publicly (unless that is the purpose of the project). Most work is used by Executives, senior managers or team leaders of our clients and is confidential and kept within the organisation.

    2. Most reporting we do is at the aggregate level (e.g. organisation-wide or at a program level containing averages for many individual clients) and so is safe from re-identification.

    3. Access to dashboards or other reports is managed within our clients’ data management policies and procedures using their existing systems. Our clients manage who gets access to particular dashboards or reports.

    4. When we run collaborative data projects we provide aggregated data and we de-identify the individual organisations that provide that data from the report. 

    5. Where we share our work in public settings (e.g. on our website or presenting at conferences) we use ‘dummy’ data or obscured data to generate visualisations.

Security Standards

Contact us to provide details of our network and data warehouse security:

  • Network security

  • Access Management

  • Authorisation

  • Security Management

  • Dynamic Masking

bottom of page