SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and.

Slides:



Advertisements
Similar presentations
Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
KEEP IT SAFE - BACK UP! Research Data Management.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Encryption – First line of defense Plamen Martinov Director of Systems and Security.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Steve Garner Ag Communications Services IT Manager.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
For further information computersecurity.wlu.ca
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Installing SAS 9.3 Raymond R. Balise Health Research and Policy.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Secure Off Site Backup at CERN Katrine Aam Svendsen.
Data Encryption Overview South Seas Corporation Jared Owensby.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
Dr Joanna Goodger Information Hertfordshire With Bill Worthington and Mohamed Hansraj Research Data Management For Researchers.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
New Data Regulation Law 201 CMR TJX Video.
Protecting Sensitive Information PA Turnpike Commission.
TRUECRYPT.
Securing Information in the Higher Education Office.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Hands-On Microsoft Windows Server 2008
ESCCO Data Security Training David Dixon September 2014.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Choose a folder on the remote machine. For e.g. if there is a machine named comp1 in your network, please choose a folder in that machine which you will.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1.
KTAC Security Task Force Superintendents Update April 23, 2015.
Understand Encryption LESSON 2.5_A Security Fundamentals.
The Online World ONLINE DOCUMENTS. Online documents Online documents (such as text documents, spreadsheets, presentations, graphics and forms) are any.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 14 – Windows Security.
 Face to face  Oral  Written  Visual  Electronic Communication in Administration 2.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Kaspersky Small Office Security INTRODUCING New for 2014!
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Product Training 1 JetFlash Software Application.
Computer Security Sample security policy Dr Alexei Vernitski.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Company Proprietary and Confidential Texas Association of Community Health Centers - Proprietary and Confidential Fourth and Goal: Score with Meaningful.
PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner.
Dr Joanna Goodger Information Hertfordshire With Bill Worthington, Sara Hajnassiri, and Mohamed Hansraj Research Data Management For Researchers.
IT Workshop Presented by CoM IT Thursday, November 20th 3:30 – 5:00 PM MSB ROOM 4051 Speakers: Jesse Fatherree, Wade Hedgren, Kent Norton We will be covering.
Protecting PHI & PII 12/30/2017 6:45 AM
Mobile Device Encryption
Preparing for GDPR Sharing experiences of the process and using the British Canoeing Toolkit bit.ly/BCGDPRToolkit
Part 3.
Using TrueCrypt 6th May 2009.
Bethesda Cybersecurity Club
Data Management Ethical considerations for educational research
Golden rules for handling personal data
Presentation transcript:

SECURITY Research Data Management

Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and public organizations demonstrated that On average, 2.3% of laptops assigned to employees are lost each year 7.1% of employee laptops were lost or stolen before the end of their usefulness lifespan In education & research that rises to 3.7% per year with 10.8% of laptops being lost before the end of their useful life 75% are lost outside the workplace, such as in cars, on public transport, in hotels. Have you lost one yet? Safeguarding data with Research Data Management

Research Data Management Security If you lost your laptop or it was stolen, how easily could your data be stolen? Safeguarding data with Research Data Management Source: BBC.co.uk/news

Research Data Management Security Password protect your devices: Do not write your password down and leave it lying around in full view Do not use the same password for personal and work related activities Do not reuse an old password when asked to update your password Do not share your password with others for any reason Do not enable the save password option on your computer Lock your machine when you step away from your desk ( ⊞ +L on windows) Safeguarding data with Research Data Management

Research Data Management Personal Confidential Information (PCi) At UH, the UPR12 Data Management Policy refers to how staff should handle their PCi: The Managing Personal & Confidential Information (PCi) Guide : personal-and-confidential-data/ Unacceptable, but common practice: Saving PCi on a non-University computer; Use of portable media devices to store or backup PCi; Regular transfer or unencrypted transfer of PCi via portable media Safeguarding data with Research Data Management

password protected, 128-bit or 256-bit AES encryption. Encrypt the entire device, folder or file Windows 7+ only Bitlocker password protected, 128-bit or 256-bit AES encryption. automatically expands Mac Secure disk image Safeguarding data with Research Data Management Research Data Management Encryption

If you’re sharing with collaborators and partners with unknown operating system, or without root access – use TrueCrypt. Creates a virtual encrypted disk within a file and mounts it as a real disk. No installation required for sharing; can be packaged with mobile software Encryption is automatic, real-time (on-the-fly) and transparent. Encryption can be hardware-accelerated on modern processors. Provides plausible deniability, in case an adversary forces you to reveal the password: Hidden volume (steganography) and hidden operating system. Safeguarding data with Research Data Management

Research Data Management Anonymisation If you have information that is not vital to the study, then don’t share it, anonymise it. Remove direct identifiers (e.g., personal information such as addresses) Aggregate or reduce the precision of variables that might be identifiable (such as postcode). Generalise text variables to reduce identifiability Restrict continuous variables to reduce outliers Pay particular attention to anonymising relational data - some anonymised variables may become identifiable when considered in combination. Whenever editing is done, researchers need to be aware of the potential for distorting the data. For example, deleting all possible identifiers from text or sound recordings is a simple but blunt tool that creates data that are confidential but may be unusable. UK Data Archive Safeguarding data with Research Data Management