STORING YOUR DATA ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………......…... RESEARCH DATA MANAGEMENT TEAM UK DATA.

Slides:



Advertisements
Similar presentations
Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
Advertisements

Data Management Tools David Wallom. YOUR DATA DOES NOT BELONG TO YOU! IT BELONGS TO YOUR EMPLOYING INSTITUTION!
MANAGING YOUR DATA WELL …………………………………………
MANAGING & SHARING RESEARCH DATA ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………….…... LOUISE CORTI UK DATA SERVICE.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Protect Your Data: How to Store and Back up your Data Securely Open Access and Data Curation Team With thanks to the UKDA for allowing us to reuse and.
Information Systems Services Protecting Data – Keeping Safe Kevin Darley, IT Security Co-ordinator 8 th November 2012.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
Locking the Backdoor: Computer Security and Medical Office Practice Dr. Maury Pinsk, FRCPC University of Alberta Division of Pediatric Nephrology.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Developing a Records & Information Retention & Disposition Program:
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
DATA MANAGEMENT – WHAT DOES IT MEAN FOR RESEARCHERS? …………………………………………
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
DATA LIFECYCLE & DATA MANAGEMENT PLANNING ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………......…... RESEARCH DATA.
Research Data Management: The Basics Open Exeter Project team.
Back Up and Recovery Sue Kayton February 2013.
10 Essential Security Measures PA Turnpike Commission.
C AMBRIDGE N ATIONALS - BP2 How Information and data can be stored on portable devices.
New Data Regulation Law 201 CMR TJX Video.
November 2009 Network Disaster Recovery October 2014.
Backup Strategy. Backup strategy Backup copy is a second copy saved to another location, usually on a backup device e.g. USB stick.Backup copy is a second.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri Steps To Secure Your Data.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
MANAGING YOUR RESEARCH DATA: PLANNING TO SHARE ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………......…... RESEARCH.
DATA MANAGEMENT SUPPORT FOR RESEARCHERS …………………………………………
1.1 System Performance Security Module 1 Version 5.
How to Organise your Files and Folders Gareth Cole. Data Curation Officer. 6 th October 2014.
Cambridge University Library Back-up, Storage and Sharing Helping you put into practice what you know you ought to be doing… Cambridge University Library.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Ecords Management Records Management Paul Smallcombe Records & Information Compliance Manager.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Murphy’s Law If anything can go wrong, it will.. 2 Data Security and Confidentiality “… a firm belief in Murphy’s Law and in the necessity to try and.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
RESEARCH ETHICS AND DATA CONFIDENTALITY: ANONYMISATION AND ACCESS CONTROL ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………......…...
ENCRYPTION EXERCISE ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………...…... RESEARCH DATA MANAGEMENT TEAM UK DATA.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Chapter 2 Securing Network Server and User Workstations.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
SCHOOLS FINANCE OFFICERS MEETINGS Records Management, “Paper-Lite” Environments and Procedures when a school closes Elizabeth Barber.
STORING YOUR DATA: SECURITY BREACHES ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………......…... RESEARCH DATA MANAGEMENT.
Personal data protection in research projects
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Digital Stewardship Lee Dotson Digital Initiatives Librarian University of Central Florida John C. Hitt Library Presentation available at
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
Computer Security Sample security policy Dr Alexei Vernitski.
Storing and securing your research data lib.uts.edu.au utslibrary.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
UW-Madison Guidelines for Managing the Records of Departing Employees*
Slide Template for Module 4 Data Storage, Backup, and Security
Part B Computer Storage
Back Up and Recovery Sue Kayton October 2015.
DATA LIFECYCLE & DATA MANAGEMENT PLANNING
Research Data Management
Ensuring the Quality and Best Use of Information
Introduction to the PACS Security
Presentation transcript:

STORING YOUR DATA ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………......…... RESEARCH DATA MANAGEMENT TEAM UK DATA ARCHIVE UNIVERSITY OF ESSEX ……………………………………………….……………………. LOOKING AFTER YOUR RESEARCH DATA: AN ESRC ADVANCED TRAINING NETWORK COURSE UK DATA ARCHIVE, COLCHESTER, APRIL 2012

……………………………………………………………………………………………………………………………….…………………………….. …………………………………………………………………………………………………………………………………………….………………..… UK DATA ARCHIVE OVERVIEW LOOKING AFTER RESEARCH DATA FOR THE LONGER- TERM AND PROTECTING THEM FROM UNWANTED LOSS REQUIRES HAVING GOOD STRATEGIES IN PLACE FOR SECURELY STORING, BACKING-UP, TRANSMITTING, AND DISPOSING OF DATA. COLLABORATIVE RESEARCH BRINGS CHALLENGES FOR THE SHARED STORAGE OF, AND ACCESS TO, DATA. AREAS OF COVERAGE Making back-ups Data storage Data security Data transmission and encryption File sharing and collaborative environments Data disposal

……………………………………………………………………………………………………………………………….…………………………….. …………………………………………………………………………………………………………………………………………….………………..… UK DATA ARCHIVE FIELDWORK FROM HELL “I’m sorry but we had to blow up your laptop.” “What….all my client case notes and testimony, writing, pictures, music and applications. Years of work. NO!!!! What?? Are you insane?? What were you thinking? THAT’S ALL MY WORK!?” Source: Lilysussman’s BlogLilysussman’s Blog

……………………………………………………………………………………………………………………………….…………………………….. …………………………………………………………………………………………………………………………………………….………………..… UK DATA ARCHIVE DATA INFERNO What if this was your university, your office? Source: University of Southampton, School of Electronics and Computer Science

……………………………………………………………………………………………………………………………….…………………………….. …………………………………………………………………………………………………………………………………………….………………..… UK DATA ARCHIVE BACKING-UP DATA why do back-ups? Risk of loss and change - would your data survive a disaster? protect against: software failure, hardware failure, malicious attack, natural disasters back-ups are additional copies that can be used to restore originals it’s not backed-up unless backed-up with a strategy

……………………………………………………………………………………………………………………………….…………………………….. …………………………………………………………………………………………………………………………………………….………………..… UK DATA ARCHIVE BACK-UP STRATEGY consider: what’s backed-up? - all, some, just the bits you change? where? - original copy, external local and remote copies what media? - CD, DVD, external hard drive, tape, etc. how often? – assess frequency and automate the process for how long is it kept? verify and recover - never assume, regularly test a restore backing-up need not be expensive 1Tb external drives are around £50, with back-up software

……………………………………………………………………………………………………………………………….…………………………….. …………………………………………………………………………………………………………………………………………….………………..… UK DATA ARCHIVE 7 DATA STORAGE all digital media are fallible at any moment – but there can be warning signs file formats and physical storage media ultimately become obsolete optical (CD, DVD) and magnetic media (hard drive, tapes) degrade never assume the format will be around for ever best practice: use data formats with long-term availability storage strategy - at least two different forms of storage and locations maintain original copy, external local copy and external remote copy copy data files to new media two to five years after first created check data integrity of stored data files regularly (checksum) know your personal/institutional back-up strategy know data retention policies that apply: funder, publisher, home institution what to protect? not only data, and not only digital

……………………………………………………………………………………………………………………………….…………………………….. …………………………………………………………………………………………………………………………………………….………………..… UK DATA ARCHIVE 8 DATA SECURITY protect data from unauthorised access, use, change, disclosure and destruction personal data need more protection – always keep separate control access to computers passwords anti-virus and firewall protection, power surge protection networked vs non-networked PCs all devices: desktops, laptops, memory sticks, mobile devices all locations: work, home, travel restrict access to sensitive materials e.g. consent forms, patient records proper disposal of equipment (and data) even reformatting the hard drive is not sufficient control physical access to buildings, rooms, cabinets but beware of ‘requirements’ to destroy data

……………………………………………………………………………………………………………………………….…………………………….. …………………………………………………………………………………………………………………………………………….………………..… UK DATA ARCHIVE 9 ENCRYPTION always encrypt personal or sensitive data encrypt anything you would not send on a postcard for moving files e.g. transcripts for storing files e.g. shared areas, mobile devices basic principles use an algorithm to transform information (A=1) need a ‘key’ to decrypt many free softwares that are easy to use Safehouse Truecrypt Axcrypt these products: encrypt hard drives, partitions, files and folders encrypt portable storage devices such as USB flash drives

……………………………………………………………………………………………………………………………….…………………………….. …………………………………………………………………………………………………………………………………………….………………..… UK DATA ARCHIVE DATA DESTRUCTION When you delete data and documentation from a hard drive: it is probably not gone files need to be overwritten to ensure they are irretrievably deleted: BCWipe - uses ‘military-grade procedures to surgically remove all traces of any file’ Axcrypt if in doubt, physically destroy the drive using an approved secure destruction facility physically destroy portable media, as you would shred paper

……………………………………………………………………………………………………………………………….…………………………….. …………………………………………………………………………………………………………………………………………….………………..… UK DATA ARCHIVE 11 FILE SHARING & COLLABORATIVE ENVIRONMENTS Sharing data between researchers and teams too often attachments Yousendit, Dropbox – consider if appropriate as services can be hosted outside the EU open source repository software for data, e.g. Fedora and DSpace - early days Virtual Research Environments MS SharePoint Sakai file transfer protocol (ftp) physical media

……………………………………………………………………………………………………………………………….…………………………….. …………………………………………………………………………………………………………………………………………….………………..… UK DATA ARCHIVE OUR DATA MANAGEMENT SERVICES UK Data Archive Research Data Management Support Services Economic and Social Data Services RELU-Data Support service relu.data-archive.ac.uk ESRC Research Development Initiative Training Programme JISC Data Management Planning project

……………………………………………………………………………………………………………………………….…………………………….. …………………………………………………………………………………………………………………………………………….………………..… UK DATA ARCHIVE CONTACT UK DATA ARCHIVE UNIVERSITY OF ESSEX WIVENHOE PARK COLCHESTER ESSEX CO4 3SQ ……………………….…………………….…. T: +44 (0) E: W: ……………………………….………………..