8
SECURITY Research Data Management

SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and

Embed Size (px)

Citation preview

Page 1: SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and

SECURITYResearch Data Management

Page 2: SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and

Research Data ManagementSecurity

Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and public organizations demonstrated that

• On average, 2.3% of laptops assigned to employees are lost each year• 7.1% of employee laptops were lost or stolen before the end of their usefulness

lifespan

In education & research that rises to

• 3.7% per year • with 10.8% of laptops being lost before the end of their useful life

75% are lost outside the workplace, such as in cars, on public transport, in hotels.

Have you lost one yet?

Safeguarding data with Research Data Management

Page 3: SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and

Research Data ManagementSecurity

If you lost your laptop or it was stolen, how easily could your data be stolen?

Safeguarding data with Research Data Management

Source: BBC.co.uk/news

Page 4: SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and

Research Data ManagementSecurity

Password protect your devices:

• Do not write your password down and leave it lying around in full view

• Do not use the same password for personal and work related activities

• Do not reuse an old password when asked to update your password

• Do not share your password with others for any reason

• Do not enable the save password option on your computer

• Lock your machine when you step away from your desk ( +L on windows) ⊞

Safeguarding data with Research Data Management

Page 5: SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and

Research Data ManagementPersonal Confidential Information (PCi)

At UH, the UPR12 Data Management Policy refers to how staff should handle their PCi:

http://sitem.herts.ac.uk/secreg/upr/IM12.html

The Managing Personal & Confidential Information (PCi) Guide :

http://

research-data-toolkit.herts.ac.uk/document/rdtk-managing-personal-and-confid

ential-data/

Unacceptable, but common practice:

• Saving PCi on a non-University computer; • Use of portable media devices to store or backup PCi; • Regular transfer or unencrypted transfer of PCi via portable

media

Safeguarding data with Research Data Management

Page 6: SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and

• password protected, 128-bit or 256-bit AES encryption.

• Encrypt the entire device, folder or file

Windows 7+ only

Bitlocker

• password protected, 128-bit or 256-bit AES encryption.

• automatically expands

MacSecure

disk image

Safeguarding data with Research Data Management

Research Data ManagementEncryption

Page 7: SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and

Research Data ManagementEncryption

If you’re sharing with collaborators and partners with unknown operating system, or without root access – use TrueCrypt.

• Creates a virtual encrypted disk within a file and mounts it as a real disk.

• No installation required for sharing; can be packaged with mobile software

• Encryption is automatic, real-time (on-the-fly) and transparent.

• Encryption can be hardware-accelerated on modern processors.

• Provides plausible deniability, in case an adversary forces you to reveal the password: Hidden volume (steganography) and hidden operating system.

Safeguarding data with Research Data Management

Page 8: SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and

Research Data ManagementAnonymisation

If you have information that is not vital to the study, then don’t share it, anonymise it.

• Remove direct identifiers (e.g., personal information such as addresses)• Aggregate or reduce the precision of variables that might be identifiable (such as

postcode). • Generalise text variables to reduce identifiability• Restrict continuous variables to reduce outliers• Pay particular attention to anonymising relational data - some anonymised variables

may become identifiable when considered in combination.

Whenever editing is done, researchers need to be aware of the potential for distorting the data. For example, deleting all possible identifiers from text or sound recordings is a simple but blunt tool that creates data that are confidential but may be unusable.

UK Data Archive

Safeguarding data with Research Data Management