To get the best help for your situation, first answer the questions on the guide's start page.
Assess and manage risks
Data sharing always involves risks
When your organisation shares data with another organisation or opens access to the data for public use, there are always risks that need to be assessed. This is also the case when your organisation utilises the data produced by other organisations.
Various risk types related to data sharing include:
- data protection risks
- information security risks
- risks related to content (e.g. keeping the significance of information intact)
- business risks (e.g. reputational risk).
When opening access to data, risks related to comprehensive security must also be taken into account. These are described in more detail in the section Particular risks associated with opening data.
Your organisation should also familiarise itself with the Guide for Risk Management in Digital Security, in which you can choose to examine risk management from the perspective of a manager, expert or other employee.

Familiarise yourself with the principles of risk management
Risk management ensures the continuity of an organisation’s operations. It is a long-term effort that must be included in all processes of the organisation. Risk assessment and preparedness will benefit organisations, as the realisation of risks may result in physical, material or intangible damage, and repairing the consequences of these will consume resources.
Read more about the benefits of risk management in the Identify the benefits section of the Guide for Risk Management in Digital Security.
Risk management process
A risk management process describes the stages of risk management and all the measures to be taken for risks. The process and its stages are tailored to the goals of different parts of the organisation, and it is continuous, repetitive and evolving in nature.
Risk communication, risk monitoring and review, and information exchange are part of each stage of the risk management process.
For example, you can apply the ISO 31000 standard in risk management, which is a general operating model suitable for managing all kinds of risks. Read more about the risk management process in the Describe risk management measures section in the guide for Risk Management in Digital Security.
Protect your infrastructure from information security risks
Information security is increasingly important in today’s society, as we are increasingly dependent on digital services. The changing security situation creates new risks and uncertainties, which should be weighed especially when planning to open access to data.
There are risks not only to the IT infrastructure, such as hardware, software, network components, operating systems and data warehouses, but also to paper-based systems.
Read more about the most common digital security risks in the Learn the principles section of the Guide for Risk Management in Digital Security.
Particular risks associated with opening data
Opening of access to data as open data involves many benefits, but also risks. For example, data from public sources can be used to harm individuals or society.
In the worst case scenario, careless opening of data may lead to the use of the data, for offences such as
- identity theft
- scams
- attempts to damage society's critical infrastructure.
In other words, when planning to open access to data, a risk survey must also be carried out to identify broader risks, i.e. take into account so-called comprehensive security.
The question to be considered is:
What could a malicious party do to my organisation, clients, other organisations or stakeholders with the opened data?
In expert organisations, technical information security is generally at a good level, but human error also impacts information security.
A user’s social engineering is an intelligence service tactic that an attacker uses to gain possession of sensitive data or otherwise adversely affect the organisation’s operations by exploiting the user’s loyalty. Manipulation is a risk, especially for information workers using information systems.