Controlling Access to Secret Data

As any data team is aware of, controlling use of confidential data is a main concern. It’s regarding more than just ensuring that people who are not really entitled to examine or use sensitive documents do not access them; is considered also encrypting info, requiring two-factor authentication for access and regularly critiquing and promptly revoking usage of sensitive information. It has about ensuring that devices and papers happen to be physically protected and, whenever you can, not stored in shared locations or about the same computer as those filled with controlled get data.

These steps can help minimize the risk of pet or vicious disclosure. However , it is important to not forget that even if your crew has properly implemented and enforced protection protocols, illegal access can still occur. It only takes a single salesperson, HVAC technician, neighbour, babysitter, friend of a friend, police officer or complete stranger to get unwarranted usage of your secret information.

This is the reason why the ICGC provides this Best Practices doc as a guide to secure data handling techniques. It is not, however , a substitute for a formal security prepare devised simply by each institution and authorized by their institutional placing your signature to officials. The ICGC strongly recommends that institutions create and implement such programs for their local or cloud configurations just before receiving operated access info from the ICGC. This will help make certain that all parties involved understand the ICGC’s anticipations of them, which include how they definitely will protect the confidentiality of data and specimens in accordance with IRB regulations.