Skip to content

Decision Framework

When organizations are determining what exactly to hide:

  1. Identify the threat vector: what information could be used to harm?
  2. Map threat to attributes: which attribute IDs correspond to that vector?
  3. Check compliance requirements: are any flagged as compliance-protected?
  4. Select privacy level: based on threat severity, choose appropriate level
  5. Apply individual exceptions: honor individual staff requests for greater/lesser protection
  6. Verify operational viability: can organization function at this privacy level?
  7. Document & execute: log decision, implement changes, notify stakeholders

When requirements conflict, sort and act according to priority:

Priority OrderScenarios to considerRationale
1Individual safetyPhysical safety overrides all other concerns
2Legal complianceNon-negotiable regulatory requirements
3Organizational operational viabilityMust maintain ability to function
4Contractual obligationsFunder and partner commitments
5Professional credibilityReputation and attribution needs
6Accessibility/transparency valuesOrganizational values preferences