Luxembourg Income Study (LIS) asbl 17, rue des Pommiers L-2343 Luxembourg –City Tél : +(352) 26 00 30 20 Fax: +(352) 26 00.

Slides:



Advertisements
Similar presentations
Luxembourg Income Study (LIS) asbl 17, rue des Pommiers L-2343 Luxembourg –City Tél : +(352) Fax: +(352)
Advertisements

EndNote Web Reference Management Software (module 5)
The Biosafety Clearing-House of the Cartagena Protocol on Biosafety Tutorial – BCH Resources.
Tips to a Successful Monitoring Visit
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Issues in Designing a Confidentiality Preserving Model Server by Philip M Steel & Arnold Reznek.
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Statistical Disclosure Control (SDC) at SURS Andreja Smukavec General Methodology and Standards Sector.
Privacy and Information Security Training ( ) VUMC Privacy Website
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Implementation of the CoP in SLOVENIA Cooperation with data users Genovefa RUŽIĆ Deputy Director-General.
CS 501: Software Engineering Fall 2000 Lecture 14 System Architecture I Data Intensive Systems.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Configuration Management
Network security policy: best practices
Development of Remote Access Systems Tanvi Desai LSE Research Laboratory Data Manager Research Laboratory IASSIST 2008: Stanford.
United Nations Economic Commission for Europe Statistical Division Applying the GSBPM to Business Register Management Steven Vale UNECE
Chapter 13 Prepared by Richard J. Campbell Copyright 2011, Wiley and Sons Auditing Human Resources Processes: Personnel and Payroll in Service Industries.
REDCap Overview Institute for Clinical and Translational Science Heath Davis Fred McClurg Brian Finley.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Regional Seminar on Census Data Archiving for Africa, Addis Ababa, Ethiopia, September 2011 Overview of Archiving of Microdata Session 4 United Nations.
VETiS Moderation meetings – November 2012 Welcome to the Australian Institute of Education and Training.
CPS Acceptable Use Policy Day 2 – Technology Session.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
SWIS Digital Inspections Project (SWIS DIP) Chris Allen, Information Management Branch California Integrated Waste Management Board November 5, 2008 The.
2 1.Client protection principles 2.Principle #6 in practice 3.Two components of protecting client data 4.Participant feedback 5.Practitioner lessons and.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Section Five: Security Inspections and Reviews Note: All classified markings contained within this presentation are for training purposes only.
Employee Guidelines for Acceptable Use of Technology Resources.
Statistics Canada’s Real Time Remote Access Solution 2011 MSIS Meeting – Karen Doherty May 2011.
Dissemination to support Research & Analysis John Cornish.
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
Computer-Assisted Communication
Access to microdata in Europe P resented by Michel Isnard – Insee DwB Training Course, Barcelona, Jan
SE3183 Advance Web Programming Programming Session 2013/2014.
Auditing Information Systems (AIS)
Title Page programmemanagementsystem KPMD (IT Solutions) Ltd Blades Enterprise Centre, Bramall Lane, Sheffield S2 4SU, United Kingdom telephone: +44 (0)114.
Copyright 2010, The World Bank Group. All Rights Reserved. ICT - a core management issue Part 1 Managing ICT resources Produced in Collaboration between.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
Administrative procedures for microdata access at SURS October 2013.
Incident Security & Confidentiality Integrity Availability.
United States District Court for the District of Utah Welcome to ECF Attorney Training. Please make sure you have picked up all materials located at the.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
REDCap Overview Institute for Clinical and Translational Science Heath Davis Fred McClurg Brian Finley.
United States District Court for the District of Utah Welcome to ECF Attorney Training. Please make sure you have picked up all materials located at the.
2008 NCHS Data Users’ Conference Omni Shoreham Hotel Washington, DC Wednesday, August 13, 2008.
The wonderful job at KIMEP High average salary range KIMEP tuition discounts for employees Trainings & seminars for your self-development Annual performance.
The experience of a National Statistical Institute after a law change: Estonia First Regional Workshop Microdata Access in European Countries ― Cooperation.
Incident Security & Confidentiality Integrity Availability.
Creating a National Remote Access System for Register-based Research Marianne Johnson, Statistics Finland Statistical Data Confidentiality Work Session.
Web Server.
Data for secondary analysis: the experience of the UK Data Archive Hilary Beedham UK Data Archive.
Microsoft Dynamics ® NAV 2009 Service Management.
Researchers’ Usage of Microdata The example of Statistics Finland Advanced presentation – Some additional details Consultation Mission on Promoting the.
Thomas Gutberlet HZB User Coordination NMI3-II Neutron scattering and Muon spectroscopy Integrated Initiative WP5 Integrated User Access.
NIMAC for Accessible Media Producers: February 2013 NIMAC 2.0 for AMPs.
Welcome. Contents: 1.Organization’s Policies & Procedure 2.Internal Controls 3.Manager’s Financial Role 4.Procurement Process 5.Monthly Financial Report.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
The Luxembourg Income Study at Age 25
Managing the IT Function
Move this to online module slides 11-56
Red Flags Rule An Introduction County College of Morris
Torben Søborg Theme 4.2 Remote access to Microdata Files from Researchers IT Directors Group 24 and 25 October 2005 Torben Søborg
NORTHEASTERNERS, INC. IRS 990 filing instructions presentation
Unit# 5: Internet and Worldwide Web
Remote access to confidential data
Wiesbaden, 24 October, 2007 Svetlana Shutova Statistics Estonia
Item 2.2 of the Agenda Remote access to confidential data for researchers: possible actions under the 7th Framework Programme Pascal JACQUES Unit B 5 15.
A strategic approach to data development and data sharing in the social sciences Peter Elias NCRM/SRA Workshop: "Data Linkage: Exploring the Potential"
Preparing for Federal Program Monitoring Title I, Part D, Subpart 1
Presentation transcript:

Luxembourg Income Study (LIS) asbl 17, rue des Pommiers L-2343 Luxembourg –City Tél : +(352) Fax: +(352) Web : Luxembourg Income Study (LIS) asbl Thierry Kruten Luxembourg, October 2006 OECD Conference: Assessing the feasibility of micro- data access

LISSY - A Remote Access System What for ? Needs of individual information in order to test the effectiveness of policy and to set new policies implies obtain individual and possibly sensitive data which have to be gathered, managed and disseminated A remote access system offers researchers the possibility to analyze microdata from a remote location by submitting statistical queries. microdata are not physically distributed remaining under the control of the agency, while the users of the system can perform analyses at their own place of work The challenge The trade-off between a user-friendly system and a safe system is evidently present for remote access systems. Disclosure control limit the detail of the output

LISSY - A Remote Access System confidentiality, user-friendliness and feasibility Confidentiality Depends on the data providers’ requirements Restriction of queries based on the user output. Those queries are filtered either automatically or manually (Review queue) on a query basis, and a query history database has been set up and maintained (Log files) User-friendliness Oriented towards users. Mainly Academic researchers. LIS users are mainly interested in more advanced statistical analyses and like to use specific softwares Relevant aspect of the system is speed. LISSY outputs are returned within a couple of minutes and the system is available 24 hours a day, 7 days a week. (geographical constraint)

LISSY - A Remote Access System confidentiality, user-friendliness and feasibility Feasibility Most important aspect of the feasibility is the security that can be attained (IT Audit) A technological answer through the implementation of a secure architecture (Firewall, electronic authorization via password, restrictions on some IT formats such as HTTP encapsulations etc.) But also a capacity for the maintenance and administration of the system. The automatic or manual handling and evaluation of queries determines the labour intensiveness of the remote access facility. Other tasks such as the management of the users database (update, pledge) or the technical administration of the system (back-up, technical maintenance, numerous statistics concerning system usage) are also labor intensive These aspects are all directly related to budgetary constraints which one of the most important items of the LIS budget

LISSY - A Remote Access System Confidentiality policy Use of the data is restricted to Social Science Research purposes only. Access is limited to Researchers working for an academic, government or non- profit organization Users must register with the LIS and sign a pledge to obey the rules governing the use of the data Registered users receive an "user account" and "password" that are strictly personal. Therefore, listings generated from user requests will be returned ONLY to the address that was registered by the user when applying for access; Under no circumstances shall also a registered user make any attempt to locate and list any survey information to identify individual persons; No direct access of any kind is permitted to the data or the LIS network. Users agree not to attempt in any way to copy individual records through listing them in program output or in any other fashion;

LISSY - A Remote Access System Implementation

LISSY - A Remote Access System How Lissy works The operating system consisting of a series of software components which work together to receive, process and return statistical requests The users submit their statistical requests under the form of SAS, SPSS or STATA programs to LIS via the Internet mailing system The requests contain the syntax created by the user for the specific statistical package used and a standardized header identifying the user * user = (your user id) * password = (your password) * package = (SPSS, SAS or STATA) * project = (database used)

LISSY - A Remote Access System How Lissy works The heart of the system is the job control component (Post Office). It manages the entire access mechanism. It retrieves the requests from the mail server  It prepares these requests for processing by checking for all security issues like clearly identifying a user, checking for the use of illegal statistical commands, check for the usage of sequences of commands or variables or any other combinations not allowed  It returns any job that breaches security to the sender along with an error message explaining the violation  It distributes the requests to the batch processor computers  It returns the statistical results to the proper (registered) user addresses  It sends suspicious output to the review queue for manual review instead of returning results to the user  And finally it maintains critical databases needed for the overall operation. All the components of the system are physically separated and at no moment is a user in direct contact with the data

Luxembourg Income Study Any questions are welcome … “When you can measure what you are speaking about and express it in numbers you know something about it. But when you cannot measure it or express it in numbers, you knowledge is of a meager and unsatisfactory kind.” Kelvin sir William Thomson British Mathematician et physician (Belfast, Netherhall, 1907)

Luxembourg Income Study (LIS) A variety of support services …. LIS workshops (Work Hard - Play Hard !) LIS conducts annual training workshops 10 days pre- and post-doctoral workshop designed to introduce young scholars to comparative research in income distribution, poverty, and labour market outcomes using the LIS database Courses include a mixture of lectures and assistance and direction using the LIS database to explore research issues chosen by the participants “Visiting scholars program” Grants to the LIS data archives of micro-data and to the relevant data documentation are offered. The LIS staff is available for consultation, assistance and possible collaboration Direct on-site access will be allowed for datasets whose providers have given us their consent for such access