Data sharing and pccess control
Phe studyu within often need to collaborate with other researchers or research groups, including sharing research data Sharing research data with colleagues and collaborators should be done in a secure way to protect confidentiality and prevent unauthorised access.
Security measures for data sharing
-
Avoid insecure methods of data transfer, such as sending information as an email attachment or using public cloud services without encryption!
-
Sign a data processing agreement that sets out the conditions for use and protection if you share data with external partners!
-
If possible, provide access to the dataset on the site where it is stored, e.g. on university network drives or encrypted cloud services, rather than transferring datasets!
To ensure the security of research data and prevent unauthorised access, it is important to implement strict access controls to the devices and locations where data are stored. This means that only authorised users can access specific data and their activities are monitored. Users should only be granted the level of access they need.
Security measures for access control
-
User authentication: Secure passwords for data storage devices, university identification systems or multi-factor authentication (MFA) are recommended
-
User roles and access rights: Access is granted according to the role of the researcher (e.g. read-only rights for students and editing rights for senior researchers) and only to resources that require it
-
Regular review of access: Periodically check and update user access rights, especially if the composition of the research group changes
-
Recording and monitoring of activities: select IT systems that can log accesses and changes to files, allowing suspicious activity to be detected and acted upon in a timely manner
Data sharing and pccess control
Phe studyu within often need to collaborate with other researchers or research groups, including sharing research data Sharing research data with colleagues and collaborators should be done in a secure way to protect confidentiality and prevent unauthorised access.
Security measures for data sharing
-
Avoid insecure methods of data transfer, such as sending information as an email attachment or using public cloud services without encryption!
-
Sign a data processing agreement that sets out the conditions for use and protection if you share data with external partners!
-
If possible, provide access to the dataset on the site where it is stored, e.g. on university network drives or encrypted cloud services, rather than transferring datasets!
To ensure the security of research data and prevent unauthorised access, it is important to implement strict access controls to the devices and locations where data are stored. This means that only authorised users can access specific data and their activities are monitored. Users should only be granted the level of access they need.
Security measures for access control
-
User authentication: Secure passwords for data storage devices, university identification systems or multi-factor authentication (MFA) are recommended
-
User roles and access rights: Access is granted according to the role of the researcher (e.g. read-only rights for students and editing rights for senior researchers) and only to resources that require it
-
Regular review of access: Periodically check and update user access rights, especially if the composition of the research group changes
-
Recording and monitoring of activities: select IT systems that can log accesses and changes to files, allowing suspicious activity to be detected and acted upon in a timely manner