Data confidentiality tools




















Users should also authenticate their access with strong passwords and, where practical, two-factor authentication. Periodically review access lists and promptly revoke access when it is no longer necessary. Physically secure devices and paper documents.

Controlling access to data includes controlling access of all kinds, both digital and physical. Protect devices and paper documents from misuse or theft by storing them in locked areas. Never leave devices or sensitive documents unattented in public locations.

Securely dispose of data, devices, and paper records. When data is no longer necessary for University-related purposes, it must be disposed of appropriately. Sensitive data, such as Social Security numbers, must be securely erased to ensure that it cannot be recovered and misused.

Devices that were used for University-related purposes or that were otherwise used to store sensitive information should be destroyed or securely erased to ensure that their previous contents cannot be recovered and misused.

Paper documents containing sensitive information should be shredded rather than dumped into trash or recycling bins. Share sensitive information only on official, secure websites. Contact Us. Data Confidentiality deals with protecting against the disclostire of information by ensuring that the data is limited to those authorized or by representing the data in such a way that its semantics remain accessible only to those who possess some critical information e.

Comments about specific definitions should be sent to the authors of the linked Source publication. For NIST publications, an email is usually found within the document. Sometimes data cannot be modified to protect confidentiality without significantly compromising the research potential of the data. In these cases, access to the data is restricted in order to impose further confidentiality safeguards.

ICPSR has established several mechanisms through which restricted data can be distributed:. In addition to the steps ICPSR takes to ensure the confidentiality of data that has already been deposited, we also offer the following services related to disclosure risk assessment and mitigation to researchers who have not yet deposited their data or who are in the earlier stages of the data collection process:. Please enable JavaScript in your browser. JavasScript is required to use the core functionality of this site including searching, downloading data, and depositing data.

Data Confidentiality. Identifiers Two kinds of variables often found in social science data present problems that could endanger research subjects' confidentiality: direct identifiers and indirect identifiers. Examples include: Names Addresses, including ZIP and other postal codes Telephone numbers, including area codes Social Security numbers Other linkable numbers such as driver's license numbers, certification numbers, etc.

Examples include: Detailed geographic information e. Confidentiality, Informed Consent, and Data Sharing Protection of respondent confidentiality is a core tenet of responsible research practice that begins with obtaining informed consent.

ICPSR has established several mechanisms through which restricted data can be distributed: Secure Download: With this option, users submit an application to access the data, and after approval, download the data using a single-use password. At the end of the approved access period, users must destroy the data. Researchers do not receive a copy of the data, but rather analyze the data stored on ICPSR's servers.

Final analysis output is vetted and, if approved, released to the researcher.



0コメント

  • 1000 / 1000