Suomi.fi for Service Developers
Go directly to contents.
Good practices for service developers
Share and utilise data in an interoperable manner

To get the best help for your situation, first answer the questions on the guide's start page.

Assess and manage risks

Data sharing always involves risks

When your organisation shares data with another organisation or opens access to the data for public use, there are always risks that need to be assessed. This is also the case when your organisation utilises the data produced by other organisations.

Various risk types related to data sharing include:

  • data protection risks
  • information security risks
  • risks related to content (e.g. keeping the significance of information intact)
  • business risks (e.g. reputational risk).

When opening access to data, risks related to comprehensive security must also be taken into account. These are described in more detail in the section Particular risks associated with opening data.

Your organisation should also familiarise itself with the Guide for Risk Management in Digital Security, in which you can choose to examine risk management from the perspective of a manager, expert or other employee.

Updated: 27/2/2025

Familiarise yourself with the principles of risk management

Risk management ensures the continuity of an organisation’s operations. It is a long-term effort that must be included in all processes of the organisation. Risk assessment and preparedness will benefit organisations, as the realisation of risks may result in physical, material or intangible damage, and repairing the consequences of these will consume resources.

Read more about the benefits of risk management in the Identify the benefits section of the Guide for Risk Management in Digital Security.

Updated: 11/2/2025

Risk management process

A risk management process describes the stages of risk management and all the measures to be taken for risks. The process and its stages are tailored to the goals of different parts of the organisation, and it is continuous, repetitive and evolving in nature.

Risk communication, risk monitoring and review, and information exchange are part of each stage of the risk management process.

For example, you can apply the ISO 31000 standard in risk management, which is a general operating model suitable for managing all kinds of risks. Read more about the risk management process in the Describe risk management measures section in the guide for Risk Management in Digital Security.

Updated: 12/2/2025

Protect your infrastructure from information security risks

Information security is increasingly important in today’s society, as we are increasingly dependent on digital services. The changing security situation creates new risks and uncertainties, which should be weighed especially when planning to open access to data.

There are risks not only to the IT infrastructure, such as hardware, software, network components, operating systems and data warehouses, but also to paper-based systems.

Read more about the most common digital security risks in the Learn the principles section of the Guide for Risk Management in Digital Security.

Updated: 12/2/2025

Perform a risk analysis when you intend to share, open or utilise personal data

If your organisation is planning to open, share or utilise personal data, plan the matter together with your organisation’s Data Protection Officer.

From the perspective of data protection, the sharing, opening and utilisation of personal data is considered processing of personal data, unless the data is anonymised.

Your organisation must carry out a risk assessment of whether the processing of personal data will

  • jeopardise a person’s freedoms and rights
  • causes damage to the person.

The assessment must take into account the nature, scope, context and purpose of the processing of personal data. If the assessment indicates that the risk is high, your organisation must carry out a Data Protection Impact Assessment (DPIA).

Read more about risk assessments and impact assessments

Updated: 12/2/2025

Particular risks associated with opening data

Opening of access to data as open data involves many benefits, but also risks. For example, data from public sources can be used to harm individuals or society.

In the worst case scenario, careless opening of data may lead to the use of the data, for offences such as

  • identity theft
  • scams
  • attempts to damage society's critical infrastructure.

In other words, when planning to open access to data, a risk survey must also be carried out to identify broader risks, i.e. take into account so-called comprehensive security.

The question to be considered is:

What could a malicious party do to my organisation, clients, other organisations or stakeholders with the opened data?

Updated: 17/3/2025

Are you satisfied with the content on this page?

Check-list