This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
documentation-platform:data-security [2024/04/05 17:20] – removed - external edit (Unknown date) 127.0.0.1 | documentation-platform:data-security [2024/04/10 10:22] (current) – Seraina Nadig | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | <WRAP twothirds column> | ||
+ | ====== Data access and security ====== | ||
+ | </ | ||
+ | |||
+ | <WRAP colsmall>< | ||
+ | <WRAP clear/> | ||
+ | |||
+ | <WRAP group> | ||
+ | <WRAP twothirds column> | ||
+ | Data security measures can help you to **prevent unauthorized access** and (intentional or unintentional) changes to your data. Data security measures are especially relevant if you need to **[[documentation-platform: | ||
+ | |||
+ | Data security can be considerably increased with the help of technical measures and by **separating data content according to security needs** (e.g. personal from non-personal data). However, these technical measures must be accompanied by organizational measures in the form of policies and guidelines.</ | ||
+ | |||
+ | <WRAP colsmall> | ||
+ | <fs x-small> Image via [[https:// | ||
+ | |||
+ | |||
+ | ===== How to securely store and manage data ===== | ||
+ | |||
+ | * **Encrypt the data and the folders:** Encryption involves encoding digital information so that only authorized individuals can view it. This is particularly valuable when transmitting personal or sensitive data. Encrypting a file converts its contents into a jumble of meaningless code. To revert this code into understandable information, | ||
+ | * **Use passwords to protect individual files or folders:** Typically, strong passwords should be lengthy, ideally 15 characters or more. One effective method is to construct them from four randomly selected and modified words, such as " | ||
+ | * **Store data securely:** Store data on servers that have up-to-date firewall protection, security-related upgrades and patches to operating systems to avoid viruses, trojans and malicious codes. Store personal data on computers that are not connected to another external network, particularly servers that host internet services. Store non-digital data in lockable cabinets and dispose of them in designated containers. | ||
+ | * **Control and limit access:** Only grant access to the data (e.g. with “read only” or with passwords) to those members of the research team who do need access. Make sure to keep access regulations up-to-date in case someone leaves the team. For non-digital objects, make sure to control access to the (lockable) cabinets, e.g. with keys or key cards. | ||
+ | * **Dispose securely of data you no longer need:** Part of managing your data involves considering secure methods to dispose of information you no longer need. Simply pressing the " | ||
+ | * **Put guidelines and policies in place:** Create policies for the research team to ensure measures for strong password protection, encryption, secure data transmission, | ||
+ | |||
+ | ==== Other measures to protect sensitive and personal data ==== | ||
+ | * Do not send personal or sensitive data via email. This should be encrypted and sent via a secure medium, such as SWITCHfilesender. | ||
+ | * Do not use Google Drive, OneDrive or Dropbox to share sensitive or personal data. | ||
+ | |||
+ | ==== Resources ==== | ||
+ | * [[https:// | ||
+ | * UK Data Service: [[https:// | ||
+ | |||
+ | |||