Responsible Data Use: Data restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.

Slides:



Advertisements
Similar presentations
The Role of the IRB An Institutional Review Board (IRB) is a review committee established to help protect the rights and welfare of human research subjects.
Advertisements

USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Providing access to your data: Determining your audience Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
National Science Foundation Division of Science Resources Statistics May The Confidential Information Protection and Statistical Efficiency Act.
Copyright management in open access projects Iryna Kuchma Open Access Programme Manager Attribution 3.0 Unported.
SIU School of Medicine Identity Protection Act and Associated SIU Policy.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
ICPSR and the Data Seal of Approval: A Case Study Mary Vardigan Assistant Director, ICPSR October 8, 2013.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
Contractor Management and ISO 14001:2004
NSF Data Management Plan Requirements Alex Kanous
Scientific Data Management for the Protection of Human Subjects Robert R. Downs NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
Session 3 – Information Security Policies
WORLD BANK Publications The reference of choice on development The Promise, and Challenge, of Implementing Open Access at the World Bank Carlos Rossel.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Awareness Norfolk State University Policies.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.
CPS Acceptable Use Policy Day 2 – Technology Session.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Providing Access to Your Data: Tracking Data Usage Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
Providing Access to Your Data: Access Mechanisms Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
Providing access to your data Robert R. Downs, PhD Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science Information.
HIPAA PRIVACY AND SECURITY AWARENESS.
Providing Access to Your Data Matthew Mayernik National Center for Atmospheric Research Version 1.0 Review Date.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Providing Access to Your Data: Rights Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
Providing Access to Your Data: Tracking Data Usage Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
After completing this lesson, participants will be able to:  Identify ethical, legal, and policy issues for managing research data  Define copyrights,
World Data Center for Human Interactions in the Environment Needs Assessment for Managing and Preserving Geospatial Electronic Records: Preliminary Results.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
WORKING WITH SPO AND IAO Lynne HollyerNoam Pines Associate Director Research Administrator Industry Alliances OfficeSponsored Projects Office
Providing Access to Your Data: Access Mechanisms Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Elements of a Data Management Plan: Roles and Responsibilities Ruth Duerr National Snow and Ice Data Center Version 1.0 Review Date.
Providing Access to Your Data Matthew Mayernik National Center for Atmospheric Research Copyright 2012 Matthew Mayernik. Version 1.0 October 2012 Section:
NCSC Test Security. NCSC vs States’ role NCSC is not a vendor and does not handle data with PII except for prescribed research study roles by one organizational.
1 September 18, 2006 Commercial Space Launch Vehicles Lessons Learned Needs Workshop Ken Hodgdon Export Control and Interagency Liaison Division Office.
Responsible Data Use: Data Restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
Providing Access to Your Data: Rights Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
ISO/IEC 27001:2013 Annex A.8 Asset management
Responsible Data Use: Copyright and Data Matthew Mayernik National Center for Atmospheric Research Version 1.0 Review Date.
Data Management Lesley A. Brown Director of Proposal Development.
ISO DOCUMENT CONTROL. ISO Environmental Management Systems2 Lesson Learning Goals At the end of this lesson you should be able to: 
Copyright and Data Matthew Mayernik National Center for Atmospheric Research Section: Responsible Data Use Version 1.0 October 2012 Copyright 2012 Matthew.
Authorization and Inspection of Cyclotron Facilities The Authorization Process.
SEDAC Long-Term Archive Development Robert R. Downs Socioeconomic Data and Applications Center Center for International Earth Science Information Network.
Computer Technology Timpview High School
Providing access to your data: Determining your audience Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
Working with your archive organization: Broadening your user community Robert R. Downs, PhD Socioeconomic Data and Applications Center (SEDAC) Center for.
Providing access to your data: Handling sensitive data Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
Working with Your Archive : Broadening Your User Community Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
Responsible Data Use: Data restrictions Robert R. Downs, PhD Center for International Earth Science Information Network (CIESIN), Columbia University Version.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Models of Security Management Matt Cupp. Overview What is Security Management? What is Security Management? ISO/IEC ISO/IEC NIST Special Publication.
Slide 1 Standard Operating Procedures. Slide 2 Goal To review the standard operating procedures Creating the informed consent document Obtaining informed.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
CESSDA SaW Training on Trust, Identifying Demand & Networking
Criteria for Assessing Repository Trustworthiness: An Assessment
Providing Access to Your Data: Handling sensitive data
Providing access to your data Determining your audience
W. Christopher Lenhardt
Working with your archive organization Broadening your user community
Computer ethics in computer science curriculum
IS4680 Security Auditing for Compliance
A Case Study for Synergistically Implementing the Management of Open Data Robert R. Downs NASA Socioeconomic Data and Applications.
Analysis of Final HIPAA Privacy Modification Rule
Presentation transcript:

Responsible Data Use: Data restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science Information Network (CIESIN) Columbia University Version 1.0 Review Date Local Data Management Copyright 2012 Robert R. Downs.

Section: Subsection: Title; Version 1.0, Reviewed ??? Overview Background and context Relevance to data management What restrictions are needed for data? Methods used to restrict data What restrictions might need to placed on data? How are restrictions on data handled?

Section: Subsection: Title; Version 1.0, Reviewed ??? Background and context Some data contain restrictions May limit access to data and how they may be used Data users must not violate restrictions on data they use Restrictions may be placed on data for various reasons May be permanent or temporary restrictions Need to recognize restrictions on data products and services used Creators, users, and managers must protect restricted data Cannot be shared with unauthorized persons.

Section: Subsection: Title; Version 1.0, Reviewed ??? Relevance to data management Data are restricted to protect individuals or interests Intellectual property rights or licensing restrictions may apply Laws, regulations, or policies may restrict access to some data Security – Information about locations or property may be restricted Confidentiality – Information about individuals (human research subjects) Environmental Protection – Information about locations or inhabitants may be restricted (endangered species) Do not violate restrictions placed on data Ethical and responsible research conduct Civil or criminal penalties (fines, loss of privileges, or incarceration)

Section: Subsection: Title; Version 1.0, Reviewed ??? What restrictions are needed for data? Access and use Limit who may access data or how they are used (authorized users) Authorize use only for specific purposes, such as education Limit whether data may be used in new products or services Modifications or derivations of data may be prohibited Dissemination and copies May not be authorized to re-distribute or copy data Limit distribution to a specific location or service Limit distribution to a specific time period, possibly in the future May apply to any products created from data

Section: Subsection: Title; Version 1.0, Reviewed ??? How to handle restricted data If restricted data are obtained Identify data that must be restricted Label data as restricted Store data in secure facilities Transport data using secure means Include with data a description of restrictions Conditions for restrictions and acceptable uses Plan infrastructure and procedures for restricted data Work with an archive to plan for storing, managing, disseminating, accessing, copying, transmitting, and using restricted data Improve understanding on protecting restricted data Continue to learn about techniques for handling restricted data

Section: Subsection: Title; Version 1.0, Reviewed ??? How to share or redistribute restricted data Review or establish organizational policies on restricted data Identify conditions for distributing or sharing restricted data Distribute in a way that does not violate restrictions Create a plan for distribution and sharing data that complies with restrictions Request approval from authorities for data dissemination plan Disseminate data in accordance with data dissemination plan Monitor any distribution of restricted data Ensure complete compliance with all restrictions on data Cease dissemination if restrictions on data are violated Immediately report any violations to authorities

Section: Subsection: Title; Version 1.0, Reviewed ??? How do archives handle data restrictions? Limit access to authorized individuals or roles Enable access within a facility only accessible by authorized persons Limit access to authorized individuals with password-protection Place in a confidential facility without capabilities to copy or transmit data Provide options for accessing restricted data Require evidence of approval or expertise Require users to sign a confidentiality, non-disclosure, or data use agreement Require approval of data protection plan from potential users Request an exception or waiver of restrictions under certain conditions Request clearance for specific individuals to access restricted data Request declassification of restricted data from relevant authority Modify the data to protect restricted portions Change aspects of data that are restricted (recode, generalize) Remove or obscure the portions of data that are restricted (redact)

Section: Subsection: Title; Version 1.0, Reviewed ??? Resources Confidentiality Issues in Geospatial Data Applications Links to reports and articles on sharing confidential geospatial data Dealing With Sensitive Data sensitive-data Links to presentations about ethical issues and security of sensitive data ICPSR – Restricted Data Links to information about the use of restricted data

Section: Subsection: Title; Version 1.0, Reviewed ??? References Best Practices for Sharing Sensitive Environmental Geospatial Data ftp://ftp2.cits.rncan.gc.ca/pub/geott/ess_pubs/288/288863/cgdi_ip_15_e.pdf Computer Security Act of Guidelines for Providing Appropriate Access to Geospatial Data in Response to Security Concerns

Section: Subsection: Title; Version 1.0, Reviewed ??? Other Relevant Modules Data Management Plans: Data access, sharing, and re-use policies Describe data protection activities within the data management plan Providing access to your data: Handling Sensitive Data Identify sensitive data that might require restrictions Providing access to your data: Rights Sufficient intellectual property rights reduce restrictions to data Submission agreements: Constraints Data restrictions should be described within submission agreements