Skip to content

Risk and Response Matrix

Risk LevelDefinitionRemoval UrgencyExample Attributes
Very HighEnables immediate physical location or direct contact< 5 minutesPhone, physical address, real-time location
HighEnables targeted contact or identification with effort< 30 minutesEmail, full name + photo, messaging handles
MediumIncreases targeting surface when combined with other data< 2 hoursProfessional relationships, event participation, social profiles
LowMinimal targeting risk in isolation< 24 hoursGeneric role, publication dates, credentials
Threat TypeAffected ScopeTarget Privacy LevelResponse TimeSurvey Data
Direct threat to individual staffIndividualLevel 0-1< 5 minutes12% require this speed
Harassment campaign against organizationSite-wideLevel 1-2< 30 minutes9% require this speed
Partner organization under attackSelective/NetworkLevel 2< 1 hour64% would act on partner threat
Government investigation/legal actionOrganization-wideLevel 2-3Same day15% cite as trigger
Doxxing incidentImmediate fullLevel 0ImmediateCritical incident response
Escalating online threatsGraduatedLevel 2-3< 2 hoursVaries by assessment
Trigger TypeAffected ScopeTarget Privacy LevelImplementation Window
Individual staff requestIndividualStaff-determinedPer organizational policy (32% want collaborative control)
Sensitive project launchProject teamLevel 2-3Scheduled advance
Election/political periodOrganization-wideLevel 2Scheduled advance
High-visibility event/campaignRelevant teamLevel 2-3Scheduled advance
Security audit findingsSpecific vulnerabilitiesVariesPer audit timeline

Based on survey findings, the recommended control model:

  • 32% want collaborative control: staff input and organizational authority for rapid action
  • 12% trust organization to act independently: opt-in to pre-determined privacy settings
  • 9% want approval rights: individual veto on visibility changes
  • 6% want notification: informed but not consulted

Recommended implementation (hybrid approach with)

  1. Individual default privacy preferences (set once)
  2. Organizational override capability for threats
  3. Post-action notification to affected staff
  4. Restoration control returned to individuals when threat subsides
Scope TypeDescriptionImplementation MechanismUse Cases
Site-wideAll staff across entire websiteGlobal privacy level settingOrganization-wide threat response
Page-specificSpecific pages (e.g., team page, about)Page-level privacy rulesProtecting staff pages while maintaining project pages
Component-levelSpecific sections within pagesComponent tagging with privacy attributesHiding bylines in blog posts while keeping content
Individual-basedPer-person controlsIndividual staff privacy profilesPersonal threat scenarios, varying comfort levels
Role-basedBy organizational position/vulnerabilityRole-type privacy rulesProtecting higher-risk roles (directors, field staff)
Attribute-basedSpecific data types across contextsAttribute-level privacy flagsRemoving all photos site-wide but keeping names

Compliance-protected attributes (cannot be hidden even at Level 0-1 without legal review):

  • Legal Entity Registration: Board members listed on public filings
  • Editorial Accountability: bylines for published journalism
  • Grant/Funding Acknowledgments: principal investigators, project leads where contractually required
  • Regulatory Disclosures: industry-specific requirements (e.g., registered lobbyists)

These attributes should be:

  1. Flagged in CMS with compliance-required tag
  2. Subject to organizational legal review before removal
  3. Displayed with minimum necessary information (e.g., name + role only, no contact)
Requirement TypeMust-Remain-Visible ElementsOverride CapabilitySurvey Data
Legal/Regulatory complianceBoard of directors (registered entities), editorial responsibility (journalism)No override
Funder contractual obligationsFunded project acknowledgments, principal investigatorsNegotiable with funders
Professional standardsJournalistic bylines, research authorshipContext-dependent
Community accountabilityLeadership identification, organizational governanceSoft requirement
Accessibility/transparency valuesCore team visibility, organizational structureValues-based (may compromise)