Sensitive Data. Agenda Howard Noble – Research Support ACIT (IT Services) Rowan Wilson – Research Support ACIT (IT Services) Claudia Kozeny-Pelling –

Slides:



Advertisements
Similar presentations
NIGB NATIONAL INFORMATION GOVERNANCE BOARD FOR HEALTH AND SOCIAL CARE.
Advertisements

Data Management Tools David Wallom. YOUR DATA DOES NOT BELONG TO YOU! IT BELONGS TO YOUR EMPLOYING INSTITUTION!
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi David Cauchi Office of the Commissioner for Data Protection.
InterParty Privacy and Security What are the implications of establishing the InterParty Network? A presentation to the final InterParty Seminar The Hague.
The Data Protection (Jersey) Law 2005.
Data Protection.
What does the Data Protection Act do? It sets standards which must be satisfied when obtaining, recording, holding, using, disclosing or disposing of.
Developing a Records & Information Retention & Disposition Program:
ILONA GAVRONSKA GROUP IL-41 INTERNATIONAL LAW DEPARTMENT KYIV NATIONAL ACADEMY OF SCIENCES OF UKRAINE KYIV UNIVERSITY OF LAW.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
INTERNET and CODE OF CONDUCT
Audiences NI Data Protection Workshop
Data Protection Overview
Data Protection for Church of Scotland Congregations
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Dealing with confidential research information and consent agreements in research Louise Corti Associate Director UK Data Archive University of Glamorgan.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Data Protection: An enabler? David Freeland, Senior Policy Officer 23 October 2014.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
October 24, 2015 Research data management – a brief introduction Slides provided by the DaMaRO Project, University of Oxford Research Services.
Regulation of Personal Information Sally Brierley & Emma Harvey.
Data Protection for Church of Scotland Congregations.
ANONYMISATION Research Data Management. c Research Data Management Sensitive Data Sensitive Data is information covering: The racial or ethnic origin.
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Session 11 Data protection. 1 Contents Part 1: Introduction Part 2: Applicability and responsibility Part 3: Our procedures on data protection Part 4:
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Data protection—training materials [Name and details of speaker]
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Personal Data Protection
Learning Intention Legislations impact on security of information
Data Protection GCSE ICT Mrs N Steventon-2005.
Frameworks for Sensitive Data in the Research Lifecycle
Data Protection and Confidentiality
ECS SEC Lester Gilbert Learning Societies Lab
Issues of personal data protection in scientific research
GDPR – What’s it all about???
Working with Sensitive or Confidential Data John Southall Bodleian Data Librarian Subject Consultant for Economics, Sociology, Social Policy and.
General Data Protection Regulations Preparing for the upcoming changes in data protection law David Jones & Angharad Williams.
GDPR Overview Gydeline – October 2017
General Finnish DMP Guidance
GDPR Overview GDPR - General Data Protection Regulations
GDPR Overview Gydeline – October 2017
GDPR Road map to Compliance.
Understanding the issues related to the use of information
Data Protection & Freedom of Information- An Introduction
GENERAL DATA PROTECTION REGULATION (GDPR)
Privacy & Access to Information
General Data Protection Regulation (GDPR) and Data Protection
All data occupies physical space, even if we don't think of it as such.
The General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) and Data Protection
Internet Privacy and You
New Data Protection Legislation
G.D.P.R General Data Protection Regulations

Data Protection principles
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Mathew Norman, Policy & Public Affairs Officer, RLA Wales
GDPR Workshop MEU Symposium Prague 2018
Information Handling Research Student Induction Day
Data Management Ethical considerations for educational research
HIPAA Overview.
Online Data Collection: Ethics
GDPR – General Data Protection Regulation
Understanding Data Protection
General Data Protection Regulation Q & A Session
Dr Elizabeth Lomas The General Data Protection Regulation (GDPR): Changing the data protection landscape Dr Elizabeth Lomas
General Data Protection Regulation (GDPR)
Presentation transcript:

Sensitive Data

Agenda Howard Noble – Research Support ACIT (IT Services) Rowan Wilson – Research Support ACIT (IT Services) Claudia Kozeny-Pelling – Research Services Duncan Tooke – Information Security John Southall – Bodleian You (25% Researchers, 75% Support Staff) Your approaches Your concerns

Why might data be sensitive? Personal data and sensitive personal data (DPA) Confidentiality IP ownership issues

What are we discussing today? Intersection of IT and policy/regulation How can we use our current systems to best meet our responsibilities? How can we make sure that we make best use of technology within the constraints of responsibilities? Are there solutions we need that we don’t have?

Data Protection Act Data Controller – University of Oxford, third party body/institution Determines the purpose of processing Data Processors – collaborating institutions, cloud service providers, us Personal data – relates to living, identifiable individuals Sensitive personal data – as above but concerning (a) race (b) political opinions, (c ) religious beliefs (or other beliefs of a similar nature) (d) Union membership (e) physical or mental health (f) sexual life, (g) offences or alleged offences (h) court history and outcomes

Confidentiality Data need not relate to individuals Often expressly stated as in Non-Disclosure Agreements, but not necessarily Circumstances can create an expectation of confidentiality How to identify it Context Labelling Nature Trade secrets Government secrets Commercially sensitive Know how Breach involves using the information in an unauthorised manner

IP ownership For example Trade secrets (by 2018, Brexit permitting) Copyright Database rights Patentable material Statutes make it possible/likely Oxford owns IP in research data (case by case analysis recommended)

Some IT requirements arising Access control Encryption Anonymization support Appropriate online survey tools Secure online collaboration tools Long term archiving with fine-grained access controls and adequate sensitivity metadata Audited disposal where appropriate

Why might you have to release your data? You want to Funder requirements Legal proceedings Boston College RIPA Keep metadata about sensitivity status and consents Consider a schema that allows your data to be divided into sensitive and ‘normal’ for partial release

Sensitive Data Some example queries

ing sensitive personal data Application proposes passworded Word docs Collaborators did not want to use that approach Third party secure provider suggested EULA aimed at individual researcher

Travelling to gather data Going to a country where certain forms of encryption are in theory illegal Gathering data from subjects opposed to the state Backup over potentially insecure network infrastructure Risk to local storage (laptop, USB) of theft etc

Staying at home to gather data Interviewing colleagues in ways that generate sensitive personal data Storage unencrypted on departmental file server Unencrypted backup into HFS from departmental file server

Getting transcripts Using individual cloud storage from a well-known provider to store recordings and transcripts of interviews Subjects lightly anonymised Subjects personal safety at risk on breach – State actors Well-known provider webmail and file-sharing via URL into cloud store used to obtain transcripts

Some approaches Personal encrypted file store software such as Veracrypt Enabling encryption on your personal HFS backups End to end security using OpenGPG or similar Consolidating sensitive material outside your store Nexus Sharepoint as a secure location, possibly in encrypted form Departmental research data file stores for retention beyond project Data stewards? Encryption key management