Framework Map
SynD End-to-End Governance Flow
Explore how Data Providers, Requestors, Custodians, and Scientists collaborate across the seven steps of the SynD Framework. Each node summarises the accountability, checkpoints, and evidence needed to progress safely.
Guided Journey
Guides custodians, health organisations, researchers, and collaborators through a consistent, risk-weighted path for present and future synthetic data use cases.
Strengthens Governance
Works alongside the policies you already rely on, focusing solely on the creation, use, and handling of synthetic data rather than other de-identification techniques.
Benefits with Safeguards
Each stage embeds privacy, ethical, and legal guardrails so value can be unlocked only once the Framework’s assessments are satisfied and approvals are recorded.
Role Legend
Confirm that the request is properly initiated with clear accountability before any assessment begins.
Key Evidence · Signed initiation record
Ensure the use case meets ethical and legal prerequisites before data preparation.
Key Evidence · Appx 4 Use Case Assessment
Primary Decision · Is the proposed use case lawful and ethical?
Confirm lawful availability, readiness, and data quality before synthesis.
Key Evidence · Ownership confirmation
Primary Decision · Is source data lawfully owned and available for synthesis?
Balance data utility with privacy during generation.
Key Evidence · Model parameters + logs
Primary Decision · Does the synthetic dataset achieve adequate utility?
Ensure synthetic data satisfies 'very low risk' before release.
Key Evidence · Re-ID metrics (Appx 7)
Primary Decision · What is the residual re-identification risk level?
Verify that environment, people, and data controls satisfy the Five Safes framework.
Key Evidence · Completed Five Safes checklist (Appx 10)
Primary Decision · Are all Five Safes satisfied?
Formally close the governance process with signed authorisation.
Key Evidence · Signed Appx 11 record
Primary Decision · Have all preceding assessments been completed?
Provide continuous monitoring and assurance after sharing.
Key Evidence · Audit logs
Primary Decision · Has any policy breach or privacy incident been detected?
How to use this map
Pan and zoom to follow each step. Decisions branch to their next checkpoints, highlighting when actions pause, loop, or terminate. Hover over nodes for more context and use the minimap to jump between steps.
Need the templates?
Evidence prompts in each node link directly to the Appendix resources under Resources. Pair this map with the five step workspace to record progress.