Resources
This resource investigates the data sharing risks in third-party monitoring (TPM) for humanitarian response, with a focus on Somalia.
It addresses issues like data privacy, security threats, and siloed information while offering recommendations to ensure safe and ethical data management in fragile contexts.
In this resource, Diepeveen, Bryant, Mohamud, Wasuge, and Guled (2022) examine the increasing reliance on third-party monitoring (TPM) in humanitarian responses and discuss the risks and opportunities associated with data sharing, with a specific focus on the context of Somalia. Third-party monitors, often private firms hired by donors, collect data to verify program outcomes and provide independent assessments. While TPM enhances accountability, it also introduces complex data sharing risks, particularly in fragile and conflict-affected (FCV) settings where data protection is critical. This resource highlights the ethical, operational, and security challenges of data sharing in TPM and offers recommendations for mitigating risks while maintaining data utility.
Key features
The resource addresses key issues for M&E practitioners involved in TPM in FCV contexts, with a focus on responsible data sharing. The following features are particularly useful:
- Data sharing challenges: It identifies risks related to reidentification of affected people, security threats to data collectors, and the 'siloing' of data that limits its use.
- Stakeholder-specific insights: The paper analyses the perspectives and risks experienced by different stakeholders, including enumerators, local monitors, international TPM firms, donors, and implementing agencies.
- Risk mitigation across the data life cycle: It provides a framework for understanding how risks evolve as data moves through collection, sharing, and use phases.
- Recommendations for responsible data handling: The paper proposes clear guidelines for ensuring data protection in TPM, such as standardising data protection protocols across all actors.
How would you use the resource?
This resource could be used by M&E practitioners to better understand the specific risks and challenges posed by third-party monitoring in conflict settings. It provides a valuable guide for designing TPM systems that mitigate data security risks, particularly in fragile contexts. The detailed recommendations could be applied to develop more robust data protection policies for TPM, ensuring compliance with international standards while addressing local vulnerabilities. For example, evaluation managers might use the insights from the resource to craft more transparent data sharing agreements with TPM firms and ensure that enumerators in the field are better protected from both physical and digital threats.
Why are we recommending it?
This resource is recommended because it provides a thorough, context-specific analysis of the data sharing risks associated with TPM in humanitarian response, especially in FCV settings. The clear identification of risks across different stakeholders and the actionable recommendations make it highly relevant for practitioners.
Sources
Diepeveen, S., Bryant, J., Mohamud, F., Wasuge, M., & Guled, H. (2022). Data sharing and third-party monitoring in humanitarian response (HPG Working Paper). ODI. https://www.odi.org/en/publications/data-sharing-and-third-party-monitoring-in-humanitarian-response