X hits on this document

PDF document

Applying for Restricted Use Data - page 7 / 15

48 views

0 shares

0 downloads

0 comments

7 / 15

  • 6.

    Describe methods of transmitting the data between research team members (if applicable).

  • 7.

    Describe methods of storage of computer output (in electronic form as well as on paper).

Types of protection expected: Although there are alternative ways to assure security for the data and applicants should prepare their plans in a manner that best meets their needs, some or all of the following features are typically found in successful data protection plans:

  • Password protection for all files containing data (note that password protection is not regarded as sufficient protection by itself)

  • Removable storage media holding the data (e.g., CDs, diskettes, zip disks, etc.) kept in a locked compartment/room when not in use

  • Printouts derived from data analysis stored in a locked compartment/room

when not in use

  • No storage of the data any network, including LANs, Internet enabled, etc.

  • No transmittal of data or analysis output derived from the data via e-mail, e- mail attachments, or FTP (either over the Internet, an Intranet system, or within a local area network)

  • Use of the data on a dedicated computer kept in a secure room and not

connected to a network

  • No backup copies of the data to be made

  • Data stored in strongly encrypted form

Document info
Document views48
Page views48
Page last viewedFri Jan 20 00:04:55 UTC 2017
Pages15
Paragraphs231
Words3286

Comments