Providing Access to Your Data: Handling sensitive data

Slides:



Advertisements
Similar presentations
H = P = A = HIPAA DEFINED HIPAA … A Federal Law Created in 1996 Health
Advertisements

The Role of the IRB An Institutional Review Board (IRB) is a review committee established to help protect the rights and welfare of human research subjects.
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Overview of the Privacy Act
National Science Foundation Division of Science Resources Statistics May The Confidential Information Protection and Statistical Efficiency Act.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Informed Consent and HIPAA Tim Noe Coordinating Center.
Scientific Data Management for the Protection of Human Subjects Robert R. Downs NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
Session 3 – Information Security Policies
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Providing access to your data Robert R. Downs, PhD Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science Information.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Using NIMA Limited Distribution Data & Products Many of NIMA’s data and products are Unclassified Limited Distribution (LIMDIS). These materials are used.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
HQ Expectations of DOE Site IRBs Reporting Unanticipated Problems and Review/Approval of Projects that Use Personally Identifiable Information Libby White.
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
Theme: classification & distribution of government control of FEA.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Responsible Data Use: Data restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
World Data Center for Human Interactions in the Environment Needs Assessment for Managing and Preserving Geospatial Electronic Records: Preliminary Results.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Privacy and Confidentiality. Definitions n Privacy - having control over the extent, timing, and circumstances of sharing oneself (physically, behaviorally,
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
Information Security Training for People who Supervise Computer Users.
Responsible Data Use: Data Restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
HIPAA Health Insurance Portability and Accountability Act of 1996.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Providing Access to Your Data: Rights Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Research & Economic Development Office of Grants and Contracts Administration Data Security Presented by Debbie Bolick September 24, 2015.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
ISO/IEC 27001:2013 Annex A.8 Asset management
ISO DOCUMENT CONTROL. ISO Environmental Management Systems2 Lesson Learning Goals At the end of this lesson you should be able to: 
SEDAC Long-Term Archive Development Robert R. Downs Socioeconomic Data and Applications Center Center for International Earth Science Information Network.
Providing access to your data: Handling sensitive data Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
For Official Use Only (FOUO) and Similar Designations NPS Security Office
Responsible Data Use: Data restrictions Robert R. Downs, PhD Center for International Earth Science Information Network (CIESIN), Columbia University Version.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
HIPAA Privacy & Security
Dining with Diabetes IRB Training 2017.
Introduction to the Federal Defense Acquisition Regulation
Managing the IT Function
Move this to online module slides 11-56
Disability Services Agencies Briefing On HIPAA
DATA BREACHES & PRIVACY Christine M
HIPAA Privacy & Security
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
The Health Insurance Portability and Accountability Act
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Good Spirit School Division
Analysis of Final HIPAA Privacy Modification Rule
HQ Expectations of DOE Site IRBs
Data Protection What can I do? GDPR Principles General Data Protection
The Health Insurance Portability and Accountability Act
School of Medicine Orientation Information Security Training
Presentation transcript:

Providing Access to Your Data: Handling sensitive data Modules should be 3-7 minutes long Robert R. Downs, PhD Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science Information Network (CIESIN) Columbia University Version 1.0 Review Date

Overview Some data are sensitive and may require special handling. Data may be designated as sensitive for various reasons. The designation of data as sensitive may be permanent or temporary. Sensitive data must be identified and properly handled to ensure that any sensitive information is not compromised. Data managers must ensure that sensitive data are adequately protected so that they are not accessed or modified by unauthorized persons and are not lost or misused. Data users must ensure that their handling or use does not violate any restrictions that have been placed on sensitive data that they use.

Relevance to Data Management Data may be designated as sensitive to protect individuals and other life forms, property, programs, or other interests. Laws, regulations, or policies may designate data as sensitive. Licenses and agreements may specify requirements to protect data. Security: data about locations or property that cannot be disclosed. Privacy and civil rights: personal or information identifying individuals. Environmental information about locations or inhabitants that need to be protected. Proprietary information about new developments or technologies. Violating restrictions that have been placed on sensitive data is unethical and could result in civil or criminal penalties, such as fines, loss of privileges, or incarceration.

Definition of sensitive information “any information, the loss, misuse, or unauthorized access to or modification of which could adversely affect the national interest or the conduct of Federal programs, or the privacy to which individuals are entitled under section 552a of title 5, United States Code (the Privacy Act), but which has not been specifically authorized under criteria established by an Executive order or an Act of Congress to be kept secret in the interest of national defense or foreign policy” (Computer Security Act of 1987)

How are sensitive data handled? Access and use Sensitive data must be protected to limit who may have access or how they are used. Authorization for access may be limited to specific individuals or specific purposes. Sensitive data may require additional security, monitoring, and loss prevention. Safeguards may need to limit modifications or derivations of sensitive data. Restrictions may limit whether sensitive data may be used in products or services. Dissemination and copies Restrictions may limit who is authorized to distribute the data, how the data may be distributed, and whether copies of the data may be created. Distribution of sensitive data may be limited to a specific location or service. Distribution may be limited to a specific time period, which may be in the future. Distribution of data and derived products or associated services may be limited.

Methods for handling sensitive data Identify data that must be designated as sensitive. Designate data that are sensitive and label as sensitive. Store sensitive data in secure facilities. Transport sensitive data using secure means. Include with sensitive data, a description of the conditions for handling sensitive data along with acceptable uses. Establish infrastructure and procedures for storing, managing, disseminating, accessing, copying, transmitting, and using sensitive data. Train staff on how to protect sensitive data from unauthorized use.

Methods of providing access to sensitive data Limit access to authorized individuals or roles Enable access within a facility only accessible by authorized persons. Limit access to authorized individuals with password-protection. Establish a data enclave without capabilities to copy or transmit data. Provide options for authorizing access to sensitive data Require evidence of approval or expertise. Require users to sign a confidentiality, non-disclosure, or data use agreement. Require approval of data protection plan from potential users. Request an exception or waiver of restrictions under certain conditions. Request clearance for specific individuals to access sensitive data. Request declassification of sensitive data from relevant authority. Modify the data to protect sensitive portions Change aspects of data that are sensitive (recode, generalize) Remove or obscure the portions of data that are sensitive (redact)

Providing access to sensitive data Review or establish organizational policies on sensitive data Identify conditions under which sensitive data may be disseminated. Select a dissemination method that does not violate restrictions. Create a data dissemination plan for sensitive data. Request approval from authorities for data dissemination plan. Disseminate data in accordance with data dissemination plan. Monitor data dissemination to ensure compliance with all restrictions on sensitive data. Cease dissemination if restrictions on sensitive data are violated and immediately report any violations to authorities.

References and Resources Where to go for more information Best Practices for Sharing Sensitive Environmental Geospatial Data http://www.geoconnections.org/publications/Key_documents/Sensitive_Env_Geo_ Data_Guide_EN_v1.pdf Computer Security Act of 1987 http://csrc.nist.gov/groups/SMA/ispab/documents/csa_87.txt Confidentiality Issues in Geospatial Data Applications http://sedac.ciesin.columbia.edu/confidentiality/ Dealing With Sensitive Data http://www.dcc.ac.uk/events/research-data-management-forum/rdmf4-dealing- sensitive-data ICPSR – Restricted Data http://www.icpsr.umich.edu/icpsrweb/ICPSR/access/restricted/ Guidelines for Providing Appropriate Access to Geospatial Data in Response to Security Concerns http://www.fgdc.gov/policyandplanning/Access%20Guidelines.pdf

Other Relevant Modules Data Management Plans: Data access, sharing, and re-use policies Responsible data use: Data restrictions Providing access to your data: Rights Submission agreements: Constraints