/
How will you manage access and security?
How will you manage access and security?
Questions to consider:
- What are the risks to data security, and how will these be managed?
- How will you control access to keep the data secure?
- How will you ensure that collaborators can access your data securely?
- If creating or collecting data in the field, how will you ensure its safe transfer into your main secured systems?
Guidance:
If your data is confidential (e.g. personal data not already in the public domain, confidential information or trade secrets), you should outline any appropriate security measures and note any formal standards that you will comply with e.g. ISO 27001.
SAMPLE:
Our data is collected in the lab and copied to the data storage via a secure, isolated network. Access to data is protected by passwords (databases) or through secure login procedures (application server). The access to the backup is restricted and available only to PI. Collaborators can access the data through a secure data sharing server, if required by the particular project.
, multiple selections available,
Related content
How will the data be stored and backed up during the research?
How will the data be stored and backed up during the research?
More like this
Related Policies
Related Policies
More like this
3. Making data openly accessible
3. Making data openly accessible
More like this
How will you manage copyright and Intellectual Property Rights (IPR) issues?
How will you manage copyright and Intellectual Property Rights (IPR) issues?
More like this
7. Data security
7. Data security
More like this
6. Allocation of resources
6. Allocation of resources
More like this