This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Security
Only authorised people should be able to access research data, so it must be protected using appropriate tools. Data security includes measures to protect data in worst case scenarios.
Updated: 29 April, 2019
You must ensure that only authorised people can access, copy or edit your research data. Doing so should mean that data will be safe from unauthorised use and personally identifiable information will be seen only by authorised people. Remember that you are legally responsible for protecting personally identifiable information, when present – in these cases, security becomes a requirement rather than a choice. Under the General Data Protection Regulation, from 25 May 2018, failing to protect this type of data will involve harsh fines and severe reputational damage.
When does security matter?
Data security includes a series of practical measures to protect yourself and the safety and privacy of data subjects (if any are involved) in worst case scenarios. Think, for example, of the following:
- Someone could accidentally delete your research data
- Commercially-confidential data could be leaked outside of your organisation
- Hackers could get hold of your data
- Personally identifiable information could be exposed
Many other similar scenarios exist and we are sure you wish to avoid them. In fairness, it is usually not too complex to set up security measures for a research project.
Data security in practice
We highly recommend the following practices when you manage research data:
- Digital access control: only trusted colleagues should have “write” [1] access to important files and directories. All operating systems and most software let you control access levels and permissions for each user.
- System level precautions: systems used to store and manage data need to be kept secure through a combination of regular patching and security audit. In this day and age, it is unusual for systems not to be connected to a network: these connections must be kept secure through the appropriate use of firewalls and access control technology. For particularly sensitive information, you could consider data safe havens [2], secure file transfer networks such as Safe Share [3] or even storing the data on a totally isolated machine.
- Physical access control: you should ensure that only trusted people can enter the building/area where you hold data.
- Passwords: you should have a strong password [4] controlling access to your computer and any device used in your research. Software to manage passwords may help where you have many of them. CESSDA assembled a few suggestions [5] on password security, which we encourage you to read.
- Encrypted storage and files: it is best practice to encrypt your hard drive, which can be done natively on Windows [6] and Apple [7] systems. You can also decide to encrypt single files, which we recommend when using personal data. When encrypting a file, make sure you never lose the encryption key! As an example, mainstream software such as the Microsoft Office suite allows you to encrypt files with a password when saving.
- Secure file erasing: when you dispose [8] of sensitive data, you should make sure it is fully removed from your hard drive (pressing the delete key to send it to the bin is insufficient). You can achieve this by physically destroying storage devices (often too extreme), or by using software tools. Data stored in the cloud poses another set of problems [9]. It can be difficult to satisfy yourself that data has been completely destroyed.
Further reading
Footnotes
- [1] File system permissions https://en.wikipedia.org/wiki/File_system_permissions
- [2] Data Safe Havens in health research and healthcare (DOI) https://doi.org/10.1093/bioinformatics/btv279
- [3] Safe Share https://www.jisc.ac.uk/safe-share
- [4] Choosing strong passwords https://www.ed.ac.uk/infosec/how-to-protect/lock-your-devices/passwords/choosing-strong-passwords
- [5] Security https://www.cessda.eu/Research-Infrastructure/Training/Expert-tour-guide-on-Data-Management/4.-Store/Security
- [6] BitLocker https://docs.microsoft.com/en-us/windows/device-security/bitlocker/bitlocker-overview
- [7] FileVault https://support.apple.com/en-gb/HT204837
- [8] UKDS - Data disposal https://www.ukdataservice.ac.uk/manage-data/store/disposal
- [9] How to Delete Data from the Cloud https://www.cebit.de/en/news-trends/news/how-to-delete-data-from-the-cloud-1050
RDM at your institution
Quick access to relevant RDM information and guidance provided by your institution.
Add/update a link to your institutional RDM pageGot a suggestion for an update?
To suggest changes, or new content to be included in the toolkit, please get in touch.