An integrated system for handling restricted use data Felicia LeClere, Ph.D. IASSIST 2009 Tampere, Finland.

Slides:



Advertisements
Similar presentations
Publication Module using back end interface. Institution Data Entry Add Documents. Edit/Delete Documents that are added but not yet sent to Institution.
Advertisements

Instructors: Connie Hutchison & Christopher McCoy
Presentation on 3CD welcomes you to a Winman Software Pvt. Ltd.
A Producer’s Guide to Chubb’s SMART Application Platform
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
E-Gov Presented by Technical Services An electronic imaging system for accessing Harris County case records.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
The Application for Renewal Accreditation: Electronic Submissions.
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
S ECURITY M ADE S IMPLE Technology leader in modern two-factor authentication via SMS Morten Skovsgaard Sales Manager
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
JOIN A COMMUNITY OF 80,000 E-COMMERCE SITES WORLDWIDE.
Advanced Workgroup System. RED Advanced Workgroup Systems: Scan Features Copy Print Scan DNSG Software Our Customers Documents Our Customers Documents.
Advanced Last Updated: May Class Outline Part 1 - Review –Review of basics –Review of files and folders Part 2 - Attachments –Sending.
Microsoft Office 2013 ®® Appendix A Introduction to Cloud Computing.
The Internet & The World Wide Web Notes
The basics of the Online Portal
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
1 Card Scanning Solutions SigniShell CSSN – Card Scanning Solutions THE ULTIMATE SIGNATURE CAPTURE & AUTHENTICATION SOLUTION.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Portal and AQAS-Philadelphia University 21-22/6/2011 AVCI Platform in PU Dr. Abdel-Rahman Al-Qawasmi Philadelphia University Director of Computer Center.
The Right Choice for Call Recording OAISYS and PCI DSS Compliance Managing Payment Card Industry Compliance with OAISYS Call Recording Solutions.
Virtual Health & Safety Management System (VHSMS) A Brief Guide for Head Teachers.
Technology Coordinators Training. Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All rights.
CSCI 1101 Intro to Computers 6. Local Area Networks.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
An Introduction to Grants.gov Sponsored Programs Office February 22,
Jeff Shiley. Start Point System Environment User Experience Our “Unique” Requirements Solution System Evaluation & Prototype Single Sign-on Component.
Module 7: Fundamentals of Administering Windows Server 2008.
Auditing Information Systems (AIS)
EVCRS OVERVIEW EVCRS is an application designed to allow collision reports to be completed, submitted and processed electronically EVCRS is wizard based.
Mehdi Ghayoumi Kent State University Computer Science Department Summer 2015 Exposition on Cyber Infrastructure and Big Data.
ITEC 1001 Tutorial 1 Browser and Basics. Web browser software & Web pages The Web is a collection of files that reside on computers, called Web.
Excel Electronic Membership Directions, Examples and Operational Hints. Created by: Jim Armbruster.
Microsoft WorkSpace Step by Step Guide January 2015.
ادارة الوثائق الالكترونية Naji Shukri Alzaza University of Palestine April 2010.
Lightspeed is a web-blocking and filtering software program providing safe online security for educational users.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
HIPAA Security Final Rule Overview
Leading firms through the next generation of change™
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
SNG via Webinar. Where’s Webinar??  Double click Aflac 2000 folder  Highlight “SNGWebCommunicator”  Right Click and “Send To - Desktop”
Introduction to Avaya Unified Messaging Introduction to American University’s New Messaging System: Avaya Unified Messaging.
SharePoint and Active Directory Update March 18, 2010.
1 Managing Learning Assets New Horizons Conference Virginia Community College System Darek Sady Blackboard Senior Consultant April 2006 Roanoke, VA.
1 (c) 2013 FabSoft. MOST Cloud Service What is a Cloud Service? A cloud service is internet-based, meaning that MOST is hosted on a server farm on the.
Education Solution.
© CGI Group Inc. User Guide Subversion client TortoiseSVN.
222 About RPost Leader in security since 2000 Endorsed by more than 20 major bar/law associations Used by U.S. Government Used by insurance carriers.
EServices represents all the components of New Castle County’s new online plan review system for users to submit Land Development and Building plans and.
ICE Integrated Cloud Environment Cloud Scanning and Mobile Printing
eIRB Training IRB Committee Members
WikID installation/training
Streamline your HR document management processes
Microsoft WorkSpace Step by Step Guide January 2017.
Administrator Training
Configuration for Network Security
Welcome To : Group 1 VC Presentation
What Is Sharepoint? Mohsen Ashkboos
Chapter 27: System Security
Technical Support Overview and Training
Unit# 5: Internet and Worldwide Web
“PERFORM: Let’s Get Started”
Process flow Kindly note: This presentation is automated – please do not click any of your mouse buttons or keyboard keys.
Contract Management Software 100% Cloud-Based ContraxAware provides you with a deep set of easy to use contract management features.
Presentation transcript:

An integrated system for handling restricted use data Felicia LeClere, Ph.D. IASSIST 2009 Tampere, Finland

Data Confidentiality and ICPSR Tradition of ICPSR until about 10 years ago was to only handle data that could be put into the public domain Substantial change in focus due to changes in data collection methods and the demands of sponsors Rethink how we handle confidential data both internally and externally.

Confidential Data Two new initiatives at ICPSR Reorient how we process all data as we do not know which data files may include data the pose disclosure risk Large expansion in restricted use licenses and data that require special dissemination instructions.

Handling Confidential Data Data with identified disclosure risk need to be handled differently Need a secure environment in which to clean, process, and store data Serves as an processing system for all data in the future

Secure Processing Initiative Technical Requirements Solution for Windows Environment

Technical Requirements Network isolation Operating system and application isolation Separate data storage Accessible on-site or remotely through VPN Processing tools for *nix and Windows environments Seamless integration with existing workflow

Windows Environment Three ways to access Citrix Applications are isolated Familiar Windows look and feel Agent Desktop Web

Access provided through Start Menu Desktop Icon Citrix Agent

Citrix Program Neighborhood Agent Applications can be accessed from system tray Applications cannot access any files on host system Citrix application folders also added to Start menu Folders available while Agent active

Citrix Desktop Client Self-contained environment Runs in a separate window Isolated from host computer Familiar look and feel

Automating restricted use contracting Current practice is a paper based with all documents from the contract held in paper Data are transmitted through encrypted CD Administrators monitor contracts through ACCESS, Excel, or some other method Very time consuming for data systems with a large number of contract holders

Innovations in the RCS All electronic signatures except institutional representatives Changes in security evaluation Behavioral checklist Network scan conducted by ITSS, Michigan Freeware workstation audits

Innovations in the RCS Secure download of data 2-factor authentication Triggered by contract approval Single download with manual override

Contract Database Secure Storage Automated Reminder System Contract Management System ITSS Nessus Scanner Researcher workstation MyData Login & Password Security Audit Software Token Researcher workstation MyData Login & Password Security Audit Software Token Download Database Contract Application System Secure Online Analysis (SSDA) Secure Download System

Method of Access to Contracting System

Application flow Based on ICPSR’s authentication system MYDATA for the applicant Allows for return to upload additional components IRB approval Scanned signature pages Revised contract terms

USER INTERFACE

Signature Process Two approaches -for primary investigator and research staff, we will accept electronic signature. Each will be sent an that directs them to a signature page. - for institutional representative, the p.i. will be sent an with a signature page that will need to be signed, scanned, and uploaded.

Signature for researchers Add researchers and send for signature

Researchers’ signature page Lists all of the researchers, provides agreement terms, and a clickable signature field

Institutional representatives signature There will be a document attached to the to be sent to PI that will be signed by Institutional Representative.

Security orientation Current orientation is a “trust me” orientation with very high burden for users to assess computer security New orientation ---provide users with tools to assess security

Security Process Three components Behavioral components Network Security Workstation security

How we approach security Two security focuses Where the data are stored Where users will be analyzing the data

Behavioral questions Allows users to justify some departures from appropriate secure data behaviors.

Setting up storage location

Setting up user locations

Using the security dashboard

What this tells us The NAS storage device and the workstation will need a SCAN (which is a NESSUS scan conducted by ITSS at the University of Michigan). The button request will run it and generate results that our staff will evaluate. If the block turns green, the system passes. If it is yellow, it means that you will need to retrieve response, remedy security issues, and rescan.

What this tells us The Audit is only required for the workstation. The clickable instructions will provide the users with instructions about how to download freeware and run it. The results of the audit will be ed to our staff. The block again will turn green if no changes are necessary. The block will be red and a clickable link will provide users with instructions on how to resolve security issues

Navigation panel for user interface

Backend system Administrative portal Reporting System Automated system to send reminders Secure Download System

Future Roll out with the Panel Study of Income Dynamics in September 2009 and the National Longitudinal Study of Adolescent Health in January Proposal into NIH to move data storage and analysis to the “computing cloud” -- that is utility computing on the internet.