Data Provenance & Reuse Boundaries
Stopping silent data drift
Core stance
Most data risk does not come from breach. It comes from reuse without remembering why data was collected.
What data provenance answers
- Where did this data come from?
- For what purpose was it collected?
- Under what consent?
- What assumptions applied?
Reuse boundaries
Reuse boundaries define:
- Permitted secondary uses
- Prohibited uses
- Review or renewal conditions
Common failure pattern
“We already have the data, so let’s use it.”
This is how consent quietly expires.
Exercises
- Pick one dataset and write its origin story
- List allowed vs disallowed reuse
- Define a review trigger for expanded use
Suggested next step
Attach a reuse boundary note to one existing dataset.