Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
Data Management Tools David Wallom. YOUR DATA DOES NOT BELONG TO YOU! IT BELONGS TO YOUR EMPLOYING INSTITUTION!
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Baltic High School Classroom Connections Presentation.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Selecting a Data Sharing Repository. 2 Why Share Data? Enabling others to replicate and verify results as part of the scientific process Allows researchers.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Basic Data Safety Practices That Can Prevent Malpractice Claims & Ethics Violations Grant County Bar Association June 14, 2011 Kim J. Brand PresidentFounder.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Back Up and Recovery Sue Kayton February 2013.
Data Preservation Best Practices for preserving your research data for future reuse The goal of data preservation is to ensure that your data is in a sustainable.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Protecting ICT Systems
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Chapter Three OPERATING SYSTEMS.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
Slide 1 Tomorrow’s Technology and You Chapter 10 Computer Security.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Keeping you Running Part I Experiences in Helping Local Governments Develop Cyber Security and Continuity Plans and Procedures Stan France & Mary Ball.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Murphy’s Law If anything can go wrong, it will.. 2 Data Security and Confidentiality “… a firm belief in Murphy’s Law and in the necessity to try and.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Component 8/Unit 9bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9b Creating Fault Tolerant.
Chapter 2 Securing Network Server and User Workstations.
Choosing Between Data Sharing Repositories for Engineering Linking Open Data cloud diagram, by Richard Cyganiak and Anja Jentzsch.
Why is it important to back up your work/information? If you do not back up your work or information then your data might be lost when your computer clashes.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
KTAC Security Task Force Superintendents Update April 23, 2015.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction TO Network Administration
Security and Ethics Safeguards and Codes of Conduct.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
By Molly.  Definition: refers to the copying of files/data to a different medium.  Why back up data? - To safe against loss of data. - To safe against.
Information Management and the Departing Employee.
Welcome to the ICT Department Unit 3_5 Security Policies.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Information Security and Privacy in HRIS
PDF Recovery Tool Fix Portable Document File Format.
Slide Template for Module 4 Data Storage, Backup, and Security
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Use It or Lose It! Preserving Your Digital Documents
Back Up and Recovery Sue Kayton October 2015.
Data Storage and Security
Backup and restoration of data, redundancy
Unit 4 IT Security Kerris Davies.
Presentation transcript:

Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe and secure environment which is accessible, secure, and redundant.

2 Hardware and Software Desktops and laptops – not for storage of original or only copies of data! Removable media – not for storage of master copies. Check it yearly and migrate to new media every 3-5 years Cloud storage – store additional copies of data – no sensitive data, esp. highly sensitive data – Read terms and conditions

3 Hardware and Software Desktops and laptops – Computer equipment can be damaged, lost, stolen. Removable media – Media degrades over time. Software programs to read the media change and can become obsolete. Hardware changes over time, and is not always backward compatible. Cloud storage – Cloud providers go out of business – Data formats change (what you upload may not be useable when you download it) – Accidents happen. Data is corrupted, or stolen.

4 Servers and Network Drives Storage, backup and recovery available UVa Box UVaCollab Who is responsible? Practical backup and recovery

5 File Formats Think about the ability to use and re-use data in the future. Both for you, and for others. Accessibility of future data because of technology changes - proactively plan for hardware and software obsolescence. Think about who needs access to your data. Are you collaborating with someone within the University, or outside of it? Conducting funded research - be aware of any data storage and data sharing requirements. Think about data security.

6 Best Practices for File Formats Formats most likely to be accessible in the future are: non-proprietary open documented standard commonly used by a discipline- specific research community standard representation (ASCII, Unicode) unencrypted and uncompressed Remember that comprehensive documentation (metadata) is essential to accurate use, and reuse, of all data.

7 Data Security and Access Control Network security – Keep confidential or highly sensitive data off computers or servers connected to the internet Physical security – Access to buildings and rooms Computer systems & files – Use strong passwords on files and systems – Virus protection (updated continuously and running!) – Encryption

8 ISPRO UVa’s Information Security, Policy, and Records Office Information Security Responsible Computing tutorial Information Policy University Data Protection Standards Guidance on Electronic Storage of Highly Sensitive Data

9 Data Backups Reduces the risk of damage or loss Use multiple locations (here-near-far or 3-2-1) Create a backup schedule and put someone dependable in charge Use reliable backup medium Test your backup system (test file recovery, data consistency, data accuracy)

10 The UVa Library Research Data Services provides consulting and training services to UVA researchers and graduate students in all aspects of research data management. We can help you navigate and negotiate through the tricky issues and many approvals in order to responsibly share your research data. Contact us at Need assistance or have questions?