Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
documentation-platform:data-security [2024/04/05 17:20] – ↷ Page moved from test:documentation-platform:data-security to documentation-platform:data-security Seraina Nadigdocumentation-platform:data-security [2024/04/10 10:22] (current) Seraina Nadig
Line 25: Line 25:
   * **Put guidelines and policies in place:** Create policies for the research team to ensure measures for strong password protection, encryption, secure data transmission, transport and disposal are in place. Also, create awareness and communicate policies and regulations at regular intervals ensuring that everyone is aware of potential risks at all times. If members of the team have access to personal or sensitive data, use non-disclosure agreements.   * **Put guidelines and policies in place:** Create policies for the research team to ensure measures for strong password protection, encryption, secure data transmission, transport and disposal are in place. Also, create awareness and communicate policies and regulations at regular intervals ensuring that everyone is aware of potential risks at all times. If members of the team have access to personal or sensitive data, use non-disclosure agreements.
  
-<WRAP round box> 
 ==== Other measures to protect sensitive and personal data ==== ==== Other measures to protect sensitive and personal data ====
   * Do not send personal or sensitive data via email. This should be encrypted and sent via a secure medium, such as SWITCHfilesender.   * Do not send personal or sensitive data via email. This should be encrypted and sent via a secure medium, such as SWITCHfilesender.
   * Do not use Google Drive, OneDrive or Dropbox to share sensitive or personal data.   * Do not use Google Drive, OneDrive or Dropbox to share sensitive or personal data.
-</WRAP> 
  
 ==== Resources ==== ==== Resources ====
   * [[https://dmeg.cessda.eu/Data-Management-Expert-Guide/4.-Store/Security|CESSDA Data Management Expert Guide: Chapter 4]]\\   * [[https://dmeg.cessda.eu/Data-Management-Expert-Guide/4.-Store/Security|CESSDA Data Management Expert Guide: Chapter 4]]\\
-  * UK Data Service: [[https://www.ukdataservice.ac.uk/manage-data/store/encryption|Encryption]] and [[https://ukdataservice.ac.uk/learning-hub/research-data-management/store-your-data/security/|Security]] \\ The UK Data Service (2017c) has compiled information on encryption and offers short video tutorials demonstrating the use of different software tools to encrypt data.+  * UK Data Service: [[https://www.ukdataservice.ac.uk/manage-data/store/encryption|Encryption]] and [[https://ukdataservice.ac.uk/learning-hub/research-data-management/store-your-data/security/|Security]] \\ //The UK Data Service (2017c) has compiled information on encryption and offers short video tutorials demonstrating the use of different software tools to encrypt data.//
  
  
  
documentation-platform/data-security.txt · Last modified: 2024/04/10 10:22 (external edit)