The following form will document your approach to gaining access to establish @Vulnerability Initiative
Ref
Please select the relevant @Vulnerability Initiative
reference
Gaining Access to @Vulnerability Attributes
Please complete this section with:
1 - Availability of data contained within the @Vulnerability Attribute
Please consider:
Is the dataset contained in a system? Can data be extracted to the SAVVI Logical Model?
What References use to identify
2 - List with statements for each The has examples where a Legal Basis has been proposed to access certain vulnerability attributes for a purpose. See also: The to define the dataset access to @Vulnerability Attributes
Agree Data sharing in principle
Refer to the for the proposed lawful data sharing in principle. Please complete this section with:
1 - The established lawful basis
Information Governance Activities and Documents
Refer to the to Propose / Prepare Information Governance Documents Please complete this section by adding any activities and documents
For example
Data Protection Impact Assessments Information Asset Register Record of Processing Activities
Citizen Rights
Refer to the to set up procedures to support individuals’ rights Please complete this section by outlining the citizen rights used steps to establish procedures, for example right to be Informed, right to Object, etc.