X hits on this document

PDF document

Applying for Restricted Use Data - page 7 / 15





7 / 15

  • 6.

    Describe methods of transmitting the data between research team members (if applicable).

  • 7.

    Describe methods of storage of computer output (in electronic form as well as on paper).

Types of protection expected: Although there are alternative ways to assure security for the data and applicants should prepare their plans in a manner that best meets their needs, some or all of the following features are typically found in successful data protection plans:

  • Password protection for all files containing data (note that password protection is not regarded as sufficient protection by itself)

  • Removable storage media holding the data (e.g., CDs, diskettes, zip disks, etc.) kept in a locked compartment/room when not in use

  • Printouts derived from data analysis stored in a locked compartment/room

when not in use

  • No storage of the data any network, including LANs, Internet enabled, etc.

  • No transmittal of data or analysis output derived from the data via e-mail, e- mail attachments, or FTP (either over the Internet, an Intranet system, or within a local area network)

  • Use of the data on a dedicated computer kept in a secure room and not

connected to a network

  • No backup copies of the data to be made

  • Data stored in strongly encrypted form

Document info
Document views11
Page views11
Page last viewedSun Jul 24 12:32:47 UTC 2016