Evolution of the Handbook and Contributing

The Handbook is intended to dynamically evolve over time. Releases are called “versions”, starting with v1.0. Because many of the aspects that influence data sharing evolve over time, and because the initial set of case studies cannot cover the full breadth of administrative data sharing, future contributions and updates are envisioned.


The Handbook’s primary location is on the web (https://admindatahandbook.mit.edu/book). However, it is also a book, and we will, at regular intervals, make available printed copies and ebook versions. The online version and the ebook will be assigned Digital Object Identifiers (DOI). Online chapters will receive their own DOI for ease of citability. Both the ebook and the hard copy will be assigned ISBN numbers. The hard copy will be available for purchase through a number of outlets. The ebook will be available for download from the Handbook’s primary location for free.


Invited or contributed additions will be incorporated into the Handbook by a J-PAL-based editorial team. Not all contributions can be accepted. Each contribution will be subject to editorial review, and may be sent out to referees. Contributions will be asked to follow the Content, Format, and Style Guidelines and the Case Study Template. The entire process is mediated by a Github workflow, and while referee reports and editorial deliberations may not be public, the contents of the decision letter will be part of the public Github workflow.318

Updates will be accepted on a flow basis, and updates published on a flow basis as well (see Versioning). If there have been any updates, then a new version of the print copy will be issued once a year.

We would appreciate it if any improvements, corrections, and other contributions were sent back to us, for instance via the “Issues” feature on Github.

Contributing authors retain the copyright to their publication. Contributions need to be licensed liberally, at least under a Creative Commons - Attribution Non-commercial license.

Once accepted, a contribution will appear in at least one major version of the Handbook. The Editors retain the right to remove contributions in later versions of the Handbook, and do not need to notify authors of such decisions.

Content, Format, and Style Guidelines

This handbook is intended as a reference for both researchers (users of administrative data) and data providers (holders of administrative data), as well as organizations that would like to facilitate administrative data collaborations, such as universities. The technical chapters are intended to support these different audiences in learning about options, making decisions based on their individual circumstances, and finding additional resources. The case studies in this handbook should focus on showcasing:

  • Mutually beneficial partnerships that have led to innovative research projects while also answering pressing policy questions or helping the data provider understand their own data better;
  • A process of finding innovative, robust, and scalable solutions to technical, financial, legal, or ethical challenges which have led to sustainable access to administrative data that does not rely on just one research team or the personal championship of one individual in the partner organization;
  • Access to innovative types of administrative data or completely new data sources, including the creation of new datasets, describing the process of making this data useful for both the data provider and the research team;
  • Administrative data used in conducting novel RCTs, standalone or linked with primary data collection.

Content Guidelines

The Handbook aims to provide practical, actionable guidance to researchers, administrators, policy makers, and other practitioners faced with the issue of implementing a new data access mechanism, or improving an existing mechanism.

Case studies and chapters should therefore speak to the diverse points of view and interests of data providers, researchers, and third-party data hosting organizations (data custodians, intermediaries). For example, data intermediaries will be interested in particular in umbrella agreements and templates, and automated processes that reduce the cost of individual data use cases. Data providers are interested in access modalities and review processes that ensure that their constituents and interests will be protected and the research is in alignment with their policy priorities. Researchers are usually interested in data representativeness and quality and the right to freely publish findings, as well as in secure and unbureaucratic access processes.

Case studies should be specific enough so that they can serve a starting point for implementing the showcased data access mechanism in another location or with another partner.

  • What information would be useful for implementing the same solutions described in the chapter?
  • What advice do the authors have in hindsight on the advantages or disadvantages of their approach?
  • What considerations and priorities informed their decisions? Understanding the parameters and environment of the setup described will help others assess if their situation is the same or different; from budget and personnel capacity to data characteristics and legal environment.

It may not be possible to describe every aspect of the case study in equal detail and depth. In this case the authors should focus on areas in which they innovated or have particularly deep knowledge to share. We expect case studies to be about 15-20 pages long. Case study submissions can include tools, materials, and text samples where appropriate; these can be added in an appendix or as an online download of any length.

All case studies should contain a description of the different data sets being provided for access. This description could be provided in table form if there are several data sets, or can link to an online catalog of such datasets, if a large number of data sets are made available. Where feasible, it should include:

  • Name/title of the data set (or group of data sets)
  • The population and sample size covered
  • Time period covered and frequency
  • Any notable information on the data, such as
    • the sensitivity of the data and if PII or location information is included in researcher access;
    • whether there are inclusion rules, updates over time, exclusions, deletions, or data purges that have a significant influence on sample selection or data availability and reliability.

Style Guidelines

Handbook chapters should adhere to an academic writing style for a well-informed, but not expert audience. Readers may not necessarily be familiar with the authors’ academic discipline. This means the writing should be clear, precise, concise, and well organized, but avoid jargon.

Please support assertions with sources and references wherever possible. For example, if a case study mentions a policy decision that was influenced by the research, a newspaper report, legal decision, or public announcement should be cited.

Authors should properly expand all acronyms upon first use and keep an international audience in mind, as well as readers from a different discipline and career background (e.g. readers may be civil servants, research economists, technical consultants, public health specialists, etc.). Jargon or country-specific organizations, customs, legal frameworks, and institutions need to be sufficiently explained (e.g. the specifics of the education system or legal code).

All case studies should follow the same template to make the contents quickly and easily accessible.

Formatting Guidelines

Submit final drafts as either a Microsoft Word doc or a Markdown or RMarkdown file.

Section and subsection headings should use the MS Word “Heading 2” and “Heading 3” formatting styles. For submissions in Markdown, use Markdown level 2 and 3 heading syntax (## and ###). Do not include numbering in section headers (e.g., not “2.1.3 Data Use Examples”). Section numbers will be automatically generated later and are likely to change.

The title of each case study chapter should reference the admin data provider and the data hosting organization (if different). As an example, authors could use a title naming the data provider, plus an informative subtitle, such as, [title] “City of Cape Town, South Africa” [subtitle] “Aligning internal data capabilities with external research partnerships.”

All authors should list their current primary affiliation. Sample: “Shawn Cole, John G. McLean Professor of Business Administration, Harvard Business School.” The chapter template contains a section (“About the authors”) allowing authors to provide additional information there. Please also add a short paragraph to the summary of the case study (see below) that describes each author’s role in the project and dates of involvement (if not affiliated anymore).


A list of index terms must be submitted as a list, ideally in a separate file. List the primary word or phrase, plus alternatives, separated by a comma. Use a new line for each new index word/phrase. In addition, please go through your chapter and tag each index word by bolding it and enclosing it in “…”. When we implement the index, our publishing platform will automatically tag each occurrence of these words.

Sample index list:

  • Family Education Rights and Privacy Act, FERPA
  • Data Use Agreement, Data Use License, DUA

Sample occurrence in text: “The template DUA explicitly references the +Family Education Rights and Privacy Act|.”

What are good index words or phrases? Index words or phrases should be key terms from the case study that a reader may be searching for across cases studies and that would otherwise hard to find. The article should not just mention the word in passing, but should provide substantive content related to the indexed term. Terms chosen for the index should not be extremely frequent or general terms, such as “administrative data”. They should also not be used to reference passages that can easily be found using the table of contents and section headers.

Index terms might be important technical words and phrases, for example:

  • Umbrella DUA, institutional DUA
  • Consent, informed consent
  • Personally identifiable information, personal data, PII
  • Data enclave

They could reference specific laws relevant to administrative data sharing:

  • Family Education Rights and Privacy Act (FERPA)
  • Code of Federal Regulations 20 (Section 603)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Workforce Innovation and Opportunities Act (WIOA)
  • Supplementary Nutrition Assistance Program (SNAP)
  • Temporary Assistance to Needy Families (TANF)
  • Ohio Revised Code
  • Title 13, United States Code

Other options might be important institutions (U.S. Census, state government, NIH, etc.), technical roles (data manager, data officer) etc., or acronyms (assuming they were abbreviated for frequent use) as long as the chapter provides useful information about these terms related to administrative data access.


The bibliography must be submitted as a separate file compatible with reference management tools. Acceptable formats are bibtex, RIS, EndNote, XML.

References in the text should use the citation handle from the reference database after the symbol “@”. Citations go inside square brackets and are separated by semicolons. Each citation must have a key, composed of ‘@’ + the citation identifier from the database, and may optionally have a prefix, a locator, and a suffix. For example, “see &ColeDhalSautVilh2020” might reference the bibliography entry for this handbook. Full information on how to include inline citations can be found here.

The content of bibliography entries should follow the Chicago Manual of Style. Note however that we will handle styling within the manuscript.

  • URLs pointing to online documents should cite the document with all the usual information (author, publication date, etc.).
  • Legal code: expand on acronyms and ideally point to online repositories, so interested parties can easily find the text of the legal code. Example:
  • Only when citing a generic webpage, use a footnote citation; where appropriate, indicate the date when last consulted. (e.g. “Available at www.google.com.” or “See J-PAL’s policies for RCT registration, accessed at www.povertyactionlab.org/page/information-affiliates on 03-21-2020.”)


As an online-first publication, we adopt the following versioning policy:

  • The Handbook follows a variant of Semantic Versioning rules. A version is identified by a numeric version number in the format “vX.Y.Z” (Major.Minor.Patch).
  • As new chapters are added or existing chapters modified or removed, new versions of the Handbook are released.
    • Minor edits and corrections are identified internally with a patch number (e.g., v1.0.1) but not identified in the publicly available version.
    • Additions of case studies and chapters necessarily lead to an increment in the minor number (e.g., v1.1). However, such additions can be added in batches.
    • Whenever a chapter is removed, a new major version is released (e.g., v2.0.0).
    • When the curators estimate that a sufficiently large number of additions warrant highlighting through a new major number, such a major version may also be released.
  • Much of the development of the Handbook occurs openly. To make clear that a particular online version of the Handbook is not officially published, development versions have a -dev sufffix, e.g., v1.2.0-dev if leading up to a proposed v1.2.0 release.
    • Nearly completed versions that are being reviewed will have a -rc[n] suffix (e.g., v1.2.0-rc1), where rc stands for “release candidate.”

Only major versions are printed. Minor versions are made available in ebook formats. Patch versions may be made available in ebook formats.

Case Study Template

Case studies should follow the case study template. Below is an updated checklist and guidance for authors and reviewers. In a Word document, please use heading formatting (heading 2 and heading 3) for each section header. Do not number your sections. The template can be downloaded as Word.

Summary (approximately one single-spaced page)

Provide an overview of the key elements of the case study.

The goal is to give potential readers a quick idea if the case study describes a scenario similar to their own, what topics it covers, and how they might apply its lessons. The authors should:

  • Give an overview of the data:
    • Summary of data content
    • Interesting uses of the data
    • Data provider and data host: name, location, and range of activities
    • For example: “This chapter describes a partnership between the University of [country] and the traffic and transportation department of [city] in [country], an agency with 68 employees in charge of traffic and parking regulations, road use permits, construction, and public bus transport for xx residents and yy annual visitors.”
  • Briefly summarize key parameters and process of making data usable and accessible:
    • Timeline and current status
    • Hosting arrangement: data provider, researcher, or other third party?
    • Cost and resources used, staffing
    • Involved parties; e.g. data collectors and data curators (if different from data provider)
    • Access modalities
  • Summarize main insights and contributions of this chapter:
    • Key conclusions and recommendations for others
    • Any new resources or systems innovations described
    • Potentially highlight elements not covered
  • Reference/describe 1-3 main sources for the case study, if existing:
    • Role of the authors in the process above
    • An existing publication about the case study or a website with information about data access


Motivation and Introduction

Explain what drove the original project to make the data available.

Reasons could include a legal mandate, a promising research project, or a pivot towards data-driven decision making. Was the initiator a researcher or the data provider (business, non-profit, government), and what were their reasons or interests? What were the desired outcomes of the project?

This section may name a legal mandate to make data accessible, but the details (how access is organized and who has access) should be discussed in the next section “Legal Context”.

Data Use Examples

If available, provide examples of particularly interesting, innovative, or policy-relevant uses of the data.

Connect these examples with a description of the available data (see section “content guidelines” point 4 above). Particularly valuable are examples where

  • Experiments were conducted using the data, in collaboration with the data provider or independently
  • Administrative data was linked with other data sets or survey data
  • The data and research were used for policy improvements.

Figures or tables can be used to support the data use examples. Do not describe prospective or speculative uses. Cite published papers as well as any policy decisions that were made based on analysis of the data.

Making Data Usable for Research

Describe the steps for transforming the operational or administrative data records into usable data files (including metadata and documentation) for analysis.

This section should discuss both the preparation of the data itself and the data documentation and metadata. Focus on information that can help others understand the general process and the time and cost involved. Steps might be:

  1. Retrieving individual data records or operational data sets and standardizing formats
  2. Standardizing variables and matching records across data sets
  3. Cleaning, verification, reconciliation, and quality control
  4. Analysis file documentation
  5. Data documentation and metadata generation and publication
  6. Automation of the above steps, if any

Describe the resources and time needed to carry out these steps, from staffing to software and systems. Who does this work – researchers, in-house staff, contractors? Please provide examples of or references to documentation and metadata, if useful and available.

Modifications that are needed to protect the data before researchers can access them (e.g. de-identification) or before research findings and outputs can be published should be described below under “Safe Data” and “Safe Outputs.

Protection of Sensitive and Personal Data: The “Five Safes” Framework

This section should focus on aspects of the data access process that relate to ethics, data security, privacy, and protection of confidentiality. It is organized using the “Five Safes” framework. Please assess the cost and importance of each of the five aspects of data security below in terms of importance and cost on a scale from 1 (lowest) to 5 (highest).

Safe Projects - Evaluating data analysis projects for appropriateness

Describe the application and review process and approval criteria for data access requests.

If available, include information on application management systems, any IRB or other review requirements, and which expertise is sought for the review of applications (e.g. legal or statistics experts). Describe how long the approval process takes and what it costs. Does the data provider require consent from the “producers” of the data to share the data with researchers?

If there is an online portal or application process information is publicly posted, please provide a reference/citation. Note that this section should focus on protections for those in the data, e.g. is the data use appropriate, are sensitive data protected in the project, and do the benefits of using the data outweigh the risks. For other aspects of project review – in particular intellectual property rights or strategic business interests – please use the “legal framework” section above.

Safe People - Evaluating researchers who seek data access

Describe what conditions and credentials are required to be granted data access.

  • What are the requirements to apply for access and how, and by whom, are they verified - citizenship, professional standing, background security checks…?
  • Do researchers need to have human subjects training or any other kind of training? Who provides this training? How frequently does it need to be renewed?
  • Does the organization trust researchers for access procedures, for disclosure avoidance procedures, for data handling? Does it audit these? How are violations sanctioned? Note: refer back to the legal framework for sanctions if necessary.
  • Do repeat users get fast tracked? How many users can be handled?

If the data provider uses a “circle of trust” model, please describe it.

Safe Settings - How can the data be accesssed?

Describe the technical and physical infrastructure for data access and the handling of security breaches.

  • Please describe software, systems, and IT resources and weigh their advantages and disadvantages and their cost.
  • How is access restricted, e.g. is it possible only at a specific physical location, a secure computer, remote submission, or via secure remote interactive access (sometimes called a virtual data enclave), etc.? Are there multiple access settings?
  • Are the various safe settings only used for researchers, or are they also used internally (by staff of the data provider or the data intermediary)?
  • How is researcher-provided software and code handled?
  • Security: What are considered to be breaches of the safe settings? How do you handle them, who is notified about suspected or actual breaches? What are the penalties? Refer back to “legal” section if needed.

Refer to the handbook chapter on “Physical security” if necessary. Be concrete and provide references if possible to help others who want to implement the same solutions.

Safe Data - How is disclosure risk the data verified and mitigated?

Provide concrete information on the data processing steps involved in modifying the analysis data files for different levels of (researcher) access.

  • Describe the resources and staff capacity invested in creating researcher-accessible data files. Are these files created as part of your data processing pipeline, or for researchers only; either on-demand, or on a schedule?
  • Are synthetic or fake datasets used, combined with remote processing or validation?
  • What methods are used to make the data “safe”? Are data elements stripped or coarsened? To what degree are the researcher-accessible data altered from the original data, and what are the consequences for the usability of the data?
  • Discuss in particular if it is possible – and what steps are involved – to link the administrative data with other external data sets, such as survey data, that have personal identifiers. Is it possible to conduct field experiments with the data (e.g. by linking treatment information with the administrative data set, or by using the administrative data as a sample frame)? Note: added question.

Note: these are processing steps carried out after the data was made usable for research in order to remove PII and/or obscure indirect identifiers. Discuss other data processing for analysis in the “making data usable” section.

Safe Outputs- How is disclosure risk in statistical analysis results and tabulations verified and mitigated?

Describe processes, requirements, and tools used to verify the disclosure risk from published analysis results.

  • Are safe-output rules incorporated into data use agreements?
  • How (and how often) are safe outputs verified?

Discuss the practical implementation, including e.g. how long the review takes and who conducts it. Note: refer back to the legal section above regarding output review as needed. The present section should focus on how review for data protection is implemented.

Data Life-Cycle and Replicability

Preservation and Repoducibility of Researcher-Accessible Files

Describe to what degree and over which time period researcher-accessible files and master files are preserved.

  • Is there active curation, or only preservation of current bitstreams?
  • Does the data provider perform the archival/curation functions itself, is another entity within the organization responsible for this activity, or is a third-party (national, regional, university archive) responsible for this?
  • Are persistent identifiers generated for these files?
  • Can researcher-accessible files be consistently regenerated, or are they snapshots of a dynamic database or data pipeline? Is the query mechanism reproducible (can similar files be recreated, can older files be retrieved), or manual (with risk of inconsistency, variation across personnel)?

Preservation and Reproducibility of Researcher-Generated Files

Are researcher-generated intermediate and final data files and tables, and processing code and programs preserved?

  • Can other researchers access these files, with or without the permission of the original researchers?
  • Does the data provider generate persistent identifiers for any of these?

Sustainability and Continued Success


Provide examples of successful outreach activities that have made “safe people” aware of the access point and data offerings.

Discuss outreach by data intermediaries/researchers to data providers as part of “Metrics of Success”.


Discuss what makes the data access mechanism financially sustainable.

How are incremental costs covered, is there full cost recovery? What is the pricing model?

Where possible, precise numbers should be used.

Metrics of Success

Describe how the success of the data access project is evaluated.

What metrics for success are used, and who is the audience for metrics - funders, data provider, legislature?

Provide sample statistics where possible. Note: section was renamed.

About the Authors

Note: Authors may expand here on who they are, providing a short bio, and including additional affiliations, support, and relevant related activities.


The views expressed in this paper are those of the authors and not those of any sponsors.

  1. For the technically inclined: it will be the commit message of the pull request, or the rejection of such pull request.↩︎