Author: Mathew Chandler

Slides:



Advertisements
Similar presentations
Inter-Agency Child Protection
Advertisements

Chapter Five Users, Groups, Profiles, and Policies.
IMPORTANT READ CAREFULLY BEFORE USING THIS PRODUCT LICENSE AGREEMENT AND LIMITED WARRANTY BY INSTALLING OR USING THE SOFTWARE, FILES OR OTHER ELECTRONIC.
ADDING AND MANAGING USERS. Addresses Every user account must have an address The address is used by NHS Jobs to communicate with the user.
Futures – Alpha Cloud Deployment and Application Management.
Understand Database Security Concepts
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Complying with Privacy to Enable Innovation & Research
Lesson 17: Configuring Security Policies
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Data Sources Create a connection definition in Cognos Step 2: Create a Cognos Account on Each Data Source Step 1: Import Metadata Step 3: Publish Package.
1 of 7 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Electronic Proposal Development and Submission Module 3 Professional Profiles Research Suite Product Support m.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
Using the Professional Account of Survey Monkey February Welcome back to CSE’s Survey Monkey Account for Graduate Students and Faculty Louise Murray,
HIPAA PRIVACY AND SECURITY AWARENESS.
V 0.1Slide 1 Security – System Configuration How to configure WebSAMS? Access Control Other Information Configuration  system customization  system configuration.
Landlord Utility Services Work Instructions. To enter the portal, simply enter your assigned User ID and Password, provided by Consumers Energy. Log In.
2 1.Client protection principles 2.Principle #6 in practice 3.Two components of protecting client data 4.Participant feedback 5.Practitioner lessons and.
Employee Guidelines for Acceptable Use of Technology Resources.
Budget Module For Sage MIP Fund Accounting. Sage Requirements Fund Accounting 10.0 or higher Budget Module optional but required for multiple budget versions.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Moodle (Course Management Systems). Managing Your class In this Lecture, we’ll cover course management, including understanding and using roles, arranging.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
The Teacher Is In Charge There are dozens of free services, but Gaggle.Net is the only service designed specifically for classroom use. The biggest.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
1 Chapter Overview Understanding User Accounts Planning New User Accounts Creating, Modifying, and Deleting User Accounts Setting Properties for User Accounts.
Module 4: Managing Recipients. Overview Introduction to Exchange Recipients Creating, Deleting, and Modifying Users and Contacts Managing Mailboxes Managing.
Customers and Sales Controlled Online Accounting.
INSTITUTION ACCOUNT INDIVIDUAL ACCOUNTS Free account for a user whose institution has a subscription to Grant Forward Created by a user with their own.
McGraw-Hill/Irwin The Interactive Computing Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Access 2002 Using Access Tools.
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
File:///var/folders/9p/bbpc5f kd6ybdzwss43hcfzsc0000 gn/T/noun_dna_77921.png Welcome enroll learn more the icon should relate as directly as possible to.
By: Rathi Raja Section 1055, 005 About Internet Privacy  Should we have Internet Privacy? Why do we need it? Can having internet privacy help us and.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Access Account Activation and Electronic Signature Web Application.
6/19/2016 أساسيات الأتصال و الشبكات Communication & Networks Fundamentals lab 4.
19 Copyright © 2008, Oracle. All rights reserved. Security.
OPS Requirements Specification and Analysis Dustin Larson Bryan Campbell Charles Sears.
REDCap General Overview
Tracking Field Placements and Student Data with Microsoft Access
Federal Income Tax Debt
Session 5 – Data safety / security
Understanding The Computer Login Account
Professional Profiles
2016 Cybersecurity Law If any one of these describes your company
Active Directory Administration
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Welcome to the ubc orientation to QUALTRICS
Workforce Mobile (iPhone)
Workforce Mobile (Android)
The new data protection rules
Google Apps for Education
asset: Academic Survey System & Evaluation Tool
Configuring Internet-related services
Figure 6-9: Managing Users and Groups
Keeping Member Data Safe
Overview of features for new and returning users
Dynamics GP 2018 – Payroll and Human Resources
Recording Clinical Data
Introducing Schoolwires Forms & Surveys Module
Recording Clinical Data
Windows Server 2003 使用者群組管理
Online Data Collection: Ethics
Data Security Awareness
UserCreator User management for schools
Presentation transcript:

Author: Mathew Chandler Qualtrix Security Author: Mathew Chandler

Data Residence Qualtrix owns data servers within Canada. Surveys created under the University of Windsor account will reside on a server within Canada. Surveys and the accompanying data is backup to a secondary server within Canada. In case of catastrophic server failure, data is backup to a server within Ireland.

Data Access The IT administrator within the University of Windsor does not have access to individual user surveys or data. Administrators employed by Qualtrix sign agreements to the effect that they will not access individual surveys or data without express consent from the account owner. Uwin Administrator cannot give this consent, only the owner of the account that created the survey. Groups can be created for collaboration purposes, but surveys and their data can only be shared with the group by the permission of the owner of the survey. The amount of access those in a group have with regards to a shared survey and its data can be customized. Members of a group with which a survey has been shared cannot give permission to a Qualtrix employee to access a survey or its data. Only the server owner can do this.

Anonymizing of Data Qualtrix has survey options that make the data collected anonymous, so data such as IP Address or location of the respondent is not collected. This does not prevent a survey to ask question needed as part of the study, just that no additional data will be collected automatically (such as IP address or location data). This option is found under Survey Options in Qualtrix.

Respondent Restrictions Surveys can be created such that there are restrictions on the respondents. Can limit the number of respondents take a survey. An opening and closing date can be set for a survey. Can set a password that must be entered to take a survey. Can prevent respondents from taking a survey multiple times.

Withdrawal from Study If a person starts a survey, then decides to withdraw, it is simply a matter of including a question (or questions) that indicates the respondents desire to withdraw. Response data can be filtered so that those who desire to withdraw are identified and their data can be deleted.

Data Management As stated before, only the owner of the survey has access to the data (unless the owner has shared the survey and granted access to analyze data to the anyone in the group). Each account is password protected. If data is exported from the account, owners should follow their data management plan, as agreed upon with the Research Ethics Board when seeking study approval. In general, data that is anonymous (no identifying information and nothing that can be traced back to individual respondents) can be stored on the cloud. Any other data should be stored in a secure local location.