-
Resource
Improving Public Health Information: A Data Quality Intervention in KwaZulu-Natal, South Africa
[World Health Organization]This article assesses the results of the effort to improve health information in KwaZulu-Natal, South Africa.
-
Resource
Data Quality Management Model (Updated)
[Journal of AHIMA 83, no.7 (July 2012): 62-67.]This article discusses the elements and importance of health information systems for improved vital statistics.
-
Resource
Assessing the Reliability of Hospital-based Cause-of-death Statistics: Evidence-based Guidelines for Country Application
[University of Queensland, School of Population Health]This report provides findings from a large number of studies that have used medical record reviews to validate the cause of death reported.
-
Resource
What Can We Conclude from Death Registration? Improved Methods for Evaluating Completeness
[PLOS Medicine]This article discusses the evaluation of 234 variants of death distribution methods in three different validation environments, and demonstrates the application of optimal variants.
-
Resource
Use of Community Health Data for Shared Accountability
[United States Agency for International Development and Measure Evaluation]A guidance document, brief, and PowerPoint presentation for use by country ministries of health (MOHs), local government, nongovernmental organizations (NGOs), civil society, and community leaders to -
Resource
Use of Community Health Data for Shared Accountability: Guidance
[Measure Evaluation]This is a guidance for practice document on how to use health data to be more responsible and accountable to communities for their health status. This document is designed for community leaders -
Resource
Framework and strategy for integrated monitoring and evaluation of child health programmes for responsive programming, accountability, and impact
[The BMJ]The article discusses the challenges created by the fragmentation of the current monitoring and evaluation systems and suggest solutions. The authors used data mainly from the Integrated Management of -
Resource
Improving public health and health systems through evidence informed policy in the Americas
[The BMJ]This article identifies challenges and limitations that hinder efforts to link research to policy action at the country level. These challenges can be grouped into three main areas: the sociopolitical -
Resource
Digitalising Nepal’s health sector. A country’s journey towards an interoperable digital health ecosystem
[Federal Ministry for Economic Cooperation and Development (BMZ)]This case study provides analysis of key learning for the introduction of digital tools toward an interoperable health ecosystem. -
Resource
The Dangers of Gender Bias in CRVS and Cause of Death Data: The Path to Health Inequality
[Centre of Excellence for CRVS Systems]This paper is one of twelve in a knowledge brief series on gender and CRVS that aims to uncover gender bias and barriers, share case studies and emerging findings, and recommend priority areas and -
Resource
From Shared Resources, Your Personal History
[New York Times]This article offers links to websites useful for establishing family trees and lineages. -
Resource
Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) Special Publication (NIST SP) - 800-122
This publication provides in-depth information on user identification and authentication procedures.
-
Resource
Glossary of Key Information Security Terms
[National Institute of Standards and Technology, U.S. Department of Commerce]This glossary provides a central resource of terms and definitions most commonly used in National Institute of Standard and Technology information security publications.
-
Resource
Journal of Cybersecurity
[Oxford Academic]This journal publishes accessible articles describing original research in the inherently interdisciplinary world of computer, systems, and information security.
-
Resource
Glossary of Key Information Security Terms, NISTIR 7298 Revision 2
This document explains the importance of protecting the confidentiality of personally identifiable information (PII) in the context of information security.
-
Resource
Women, Business and the Law, 2016
[World Bank Group]This report draws attention to gender disparities that hinder prosperity and undermine national competitiveness, including the implications of lack of identity credentials for women.
-
Resource
How civil registration can protect and empower women and girls
[Centre of Excellence for CRVS Systems]Civil registration is the recording of important events in an individual’s life—including birth, death, marriage, and divorce. Everyone benefits from an effective civil registration system. It helps -
Resource
When there are no records of women and girls: the ripple effect
[International Development Research Centre]The quality of a country’s vital statistics has a bearing on women and girls, who are more vulnerable to poverty, early marriage, and exploitation. Without an effective civil registration and vital -
Resource
Birth registration is the basis for advancing gender equality and children’s rights
[International Development Research Centre]Many people take their birth certificate for granted. It is an unremarkable bureaucratic certainty in many lives, tucked away in a drawer or filing cabinet until it’s needed to obtain a driver’s -
Resource
Linking National ID and CRVS Systems: an Imperative for Inclusive Development
[Centre of Excellence for CRVS Systems]This paper is one of twelve in a knowledge brief series on gender and CRVS that aims to uncover gender bias and barriers, share case studies and emerging findings, and recommend priority areas and
Our Resource Library provides access to curated resources related to CRVS systems, including research, tools, publications, CRVS eLearning course, our Expert Talks video series, and a glossary of terms and definitions.
A CRVS system is one that connects relevant data from the civil registry and the health information system for the purpose of producing vital statistics. In order to function well, CRVS systems depend on common elements. These are featured under a unique section of our library. Examples include resources that focus on training, assessments and evaluations, identity management, data security and privacy, information and communications technology, and more.