Storing and securing your data
|
|
- Peregrine Bryan
- 8 years ago
- Views:
Transcription
1 Storing and securing your data Veerle Van den Eynden UK Data Service Advanced training course Managing and sharing your research data June 2015
2 Overview Looking after research data for the longer-term and protecting them from unwanted loss requires having good strategies in place for securely storing, backing-up, transmitting, and disposing of data. Collaborative research brings challenges for the shared storage of, and access to, data. Areas of coverage Making back-ups Data storage File sharing and collaborative environments Data security Data transmission and encryption Data disposal
3 Stuff happens: fieldwork nightmare I m sorry but we had to blow up your laptop. What.all my client case notes and testimony, writing, pictures, music and applications. Years of work. NO!!!! Source: lilysussman.wordpress.com
4 Stuff happens: data inferno What if this was your university, your office, your data? Fire destroyed a University of Southampton research centre resulting in significant damage to data storage facilities Source: BBC
5 Stuff happens: hard drive failure Source:
6 Backing-up data It s not a case of if you will lose data, but when you will lose data Make sure you don t lose it for good by keeping additional backup copies Protect against: software failure, hardware failure, malicious attacks, loss, accidents etc. Ask yourself: would your data survive a disaster?
7 Backing-up strategy Consider: What needs to be backed-up? All, some, just the bits you change? What media? External hard drive, DVD, online etc. Where? Original copy, external local and remote copies What method/software? Duplicating, syncing, mirroring How often? Assess frequency and automate the process For how long? How long you will manage these backups for How can you be sure? Never assume, regularly test a restore, and use verification methods
8 Local data storage All digital media are fallible Optical (CD, DVD) & magnetic media (hard drives, tape) degrade lifespan even lower if kept in poor conditions Physical storage media become obsolete e.g. floppy disks Copy data files to new media two to five years after first created
9 Storage services Online or cloud services increasingly popular Google Drive, DropBox, Microsoft SkyDrive etc. Accessible anywhere Background syncing Mirror files Mobile apps available Very convenient Everyone uses them, and that s ok BUT precautions must be taken.. Consider if appropriate, as services can be hosted outside the EU (DPA for personal data) Encrypt anything sensitive or avoid services altogether
10 Other storage options Your university or department may have options available e.g. Secure backed up storage space VPN giving access to external researchers Locally managed Dropbox-like services such as owncloud and ZendTo Secure file transfer protocol (FTP) server Data repository or archive A repository acts as more of a final destination for data Many universities have data repositories now catering to its researchers UK Data Service has it s own recently launched service called ReShare, for social science data of any kind
11 Demo: SyncToy synchronising For syncing two folders - free download from Microsoft User friendly, at the price of power
12 Verification and integrity checks Ensure that your backup method is working as intended Be wary when using sync tools in particular Mirror in the wrong direction or using the wrong method, and you could lose new files completely Applies to online DropBox-like syncing services too You can use checksums to verify the integrity of a backup Also useful when transferring files Checksum somewhat like a files fingerprint but changes when the file changes
13 Demo: MD5 checksum checks Calculate the MD5 checksum value of a file to check its integrate, e.g. after back-up or transfer Example using free MD5summer software ( Mac OSX has built in MD5 functionality Online version of demo:
14 Version control Keep track of different copies or versions of data files Useful for files kept in multiple locations Or which have multiple users A way to safeguard against accidental changes File names are a good way to do this Unique descriptive names for files Include date and/or version number in name Indicate relationships between files e.g. FoodInterview_1_draft; FoodInterview_1_final; HealthTest_ ; BGHSurveyProcedures_00_04
15 Example: version control table
16 Example: Google Drive version control Collaboratively edit documents in the cloud while tracking version history
17 Non-digital storage Printed materials, photographs degradation from sunlight and contact (sweat on skin, acid in paper) use high quality media for long-term storage/preservation e.g. using acid-free paper & boxes, non-rust paperclips (no staples), no sellotape Source: Source: Florida State Archives Confidential items, e.g. signed consent forms, interview notes store securely, in locked container separate from data files
18 Data security Protect data from unauthorised access, use, change, disclosure and destruction Personal data need more protection always keep separate and secure Who knows who s watching..!
19 Data security strategy Control access to computers: use passwords, lock your machine when away from it anti-virus and firewall protection, power surge protection all devices: desktops, laptops, memory sticks, mobile devices all locations: work, home, travel restrict access to sensitive materials e.g. consent forms, patient records Control physical access to buildings, rooms, cabinets Proper disposal of data and equipment Even reformatting the hard drive is not sufficient
20 Encryption Always encrypt personal or sensitive data = anything you would not send on a postcard e.g. moving files, interview transcripts e.g. storing files to shared areas or insecure devices Basic principles Applies an algorithm that makes a file unreadable Need a key of some kind (passphrase, file) to decrypt The UK Data Service recommends Pretty Good Privacy (PGP) More complicated than just a password, but much more secure Involves use of multiple public and private keys Image source: RRZEicons
21 Encryption software Encrypt hard drive, USB drive, folder: BitLocker (Windows) FileVault (Mac) TrueCrypt (unsupported) Encrypt individual files: Axcrypt 7zip *Note: take caution when installing AxCrypt to ensure that you uncheck options to install extra bundled software
22 Demo: Encryption with BitLocker You can use BitLocker to encrypt your hard drive or USB drive
23 Data destruction When you delete a file from a hard drive, the chances are it s still retrievable even after emptying the recycle bin Files need to be overwritten (ideally multiple times) with random data to ensure they are irretrievable File on hard disk drive File deleted from disk X X X X File securely deleted from disk
24 Data destruction software BCWipe - uses military-grade procedures to surgically remove all traces of any file Can be applied to entire disk drives AxCrypt* - free open source file and folder shredding Integrates into Windows well, useful for single files If in doubt, physically destroy the drive using an approved secure destruction facility Physically destroy portable media, as you would shred paper *Note: take caution when installing AxCrypt to ensure that you uncheck options to install extra bundled software
25 Summary of best practise in data storage and security Have a personal backup/storage strategy original local copy, external local copy and external remote copy Copy data files to new media two to five years after first created Know your institutional back-up strategy Check data integrity of stored data files regularly (checksum) Create new versions of files using a consistent, transparent system Encrypt sensitive data crucial if using web to transmit/share Know data retention policies that apply: funder, publisher, home institution and remove sensitive data securely where necessary
26 Scenario: Extending Working Lives Transition from work to retirement How operationalised in the workplace Case studies of organisations Interviews with managers and employees > 50 Observation of HR meetings Data: interview recordings and transcripts, observation notes Which data security measures are needed to handle such data? How to organise data?
27 Scenario: Phoenix Pre-eclampsia research with 900 woman at 25 medical centres in England & Wales Data: Medical data during hospital stay Questionnaire pre and post delivery (6mths, 2 yrs) Which data storage and security measures? How to organise data?
28 Scenario: Project Coast Secret Chemical & Biological Warfare programme S.A. Materials: Military documents Truth & reconciliation commission hearings Press cliipings Correspondence Interview notes Interview recordings Films How to document this data for a public archive
29 Scenario: Bath Spa Research Support How to document musical scores, images, artifacts
30 Questions? Contact details:
Storing and securing your data
Storing and securing your data Research Data Management Support Services UK Data Service University of Essex April 2014 Overview Looking after research data for the longer-term and protecting them from
More informationStorage, backup, transfer, encryption of data
Storage, backup, transfer, encryption of data Veerle Van den Eynden UK Data Archive Looking after your research data: practical data management for research projects 5 May 2015 Overview Looking after research
More informationData storage, collaboration, backup, transfer and encryption
Data storage, collaboration, backup, transfer and encryption Scott Summers UK Data Archive Practical research data management 19 April 2016 Overview Looking after research data for the longer-term and
More informationMANAGING QUALITATIVE DATA
MANAGING QUALITATIVE DATA...... LOUISE CORTI. ASSOCIATE DIRECTOR UNIVERSITY OF ESSEX DATUM WORSHOP, NEWCASTLE 26 May 2011 PRACTICAL ADVICE FOR QUALI RESEARCHERS too much DM advice out there is generic
More informationARCHIVING YOUR DATA: PLANNING AND MANAGING THE PROCESS
ARCHIVING YOUR DATA: PLANNING AND MANAGING THE PROCESS LIBBY BISHOP. RESEARCHER LIAISON UNIVERSITY OF ESSEX TCRU/NOVELLA SPECIAL SEMINAR - LONDON 29 MAY 2012 THE & ESDS QUALIDATA forty years experience
More informationData loss will happen to you at some time unless you back- up your data.
Backing- up your data You must protect your I- Tracker data. It is valuable and costly to collect, and is often the only record of the land and sea management activities that you do. The primary purpose
More informationChapter 8: Security Measures Test your knowledge
Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such
More informationINFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies
INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW
More informationEncryption Policy Version 3.0
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
More informationSECURITY POLICIES AND PROCEDURES
2014 WorldEscrow N.V./S.A. SECURITY POLICIES AND PROCEDURES This document describes internal security rules within the WorldEscrow N.V./S.A. organization. Content 1) Employee Responsibilities... 1 2) Use
More informationData Storage for Research. Michael Pinch
Data Storage for Research Michael Pinch Intro Data storage is a world full of tradeoffs Read vs Write Speed Availability vs Security Cost vs Speed This presentation is to talk about the different types
More informationSUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
More informationGuideline to Back Up Your Computer And Important Files
Guideline to Back Up Your Computer And Important Files What is backing up? To backup is to make spare copies of file and store them separately to the originals. Why should you do it? In the world of computers
More informationBackups for the Paranoid. Be afraid, very afraid
Backups for the Paranoid Be afraid, very afraid Reasons to back up You don't want to lose your data. You want to share some of your data. You want to be able to reload your computer quickly when you break
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationEncryption: Ensuring Information Security
Encryption: Ensuring Information Security Colin Chisholm CISSP, GCIH Information Security Analyst Associate Information Security & Systems / Compliance cchisholm@northwestern.edu Agenda Encryption - Explanation
More informationGuidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
More informationINFORMATION SECURITY GUIDELINES
INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS: Scope of Document 1 Data Definition Guidelines (Appendix 1).2 Data Protection Guidelines (Appendix 2).3 Protection of Electronic or Machine- Readable
More informationLSE PCI-DSS Cardholder Data Environments Information Security Policy
LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project
More informationProtection of Computer Data and Software
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
More informationMobility and Young London Annex 4: Sharing Information Securely
Young London Matters April 2009 Government Office For London Riverwalk House 157-161 Millbank London SW1P 4RR For further information about Young London Matters contact: younglondonmatters@gol.gsi.gov.uk
More informationInformation Services. Protecting information. It s everyone s responsibility
Information Services Protecting information It s everyone s responsibility Protecting information >> Contents >> Contents Introduction - we are all responsible for protecting information 03 The golden
More informationwww.neelb.org.uk Web Site Download Carol Johnston
What I need to know about data protection and information security when purchasing a service that requires access to my information by a third party. www.neelb.org.uk Web Site Download Carol Johnston Corporate
More informationA Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2
More informationSUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices
SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices 8-27-2015 4-007.1 Supersedes 4-007 Page Of 1 5 Responsible Authority Vice Provost for Information
More informationInformation Security Policy
Information Security Policy Contents Version: 1 Contents... 1 Introduction... 2 Anti-Virus Software... 3 Media Classification... 4 Media Handling... 5 Media Retention... 6 Media Disposal... 7 Service Providers...
More informationBacking up your digital image collection provides it with essential protection.
Backing up your digital image collection provides it with essential protection. In this chapter, you ll learn more about your options for creating a reliable backup of your entire digital image library.
More informationThe Best Way to Backup Your Genealogy Files
Barbara J Starmans, PLCGS Richmond Hill, ON, Canada p) 647-401-1519 e) barb@bjstarmans.com Word Count 1700 Keep Your Genealogy Research Safe by Barbara J Starmans It can happen to anyone: a hard drive
More informationCountering and reducing ICT security risks 1. Physical and environmental risks
Countering and reducing ICT security risks 1. Physical and environmental risks 1. Physical and environmental risks Theft of equipment from staff areas and Theft of equipment from public areas Theft of
More informationIT Data Security Policy
IT Data Security Policy Contents 1. Purpose...2 2. Scope...2 3. Policy...2 Access to the University computer network... 3 Security of computer network... 3 Data backup... 3 Secure destruction of data...
More informationInformation Security Plan effective March 1, 2010
Information Security Plan effective March 1, 2010 Section Coverage pages I. Objective 1 II. Purpose 1 III. Action Plans 1 IV. Action Steps 1-5 Internal threats 3 External threats 3-4 Addenda A. Document
More informationDATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
More informationNewcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
More informationNCTE Advice Sheet Storage and Backup Advice Sheet 7
Storage and Backup No matter how well you treat your system, no matter how much care you take, you cannot guarantee that your data will be safe if it exists in only one place. The risks are much greater
More informationCyber Security: Guidelines for Backing Up Information. A Non-Technical Guide
Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:
More informationVIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE
VIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE Solution Overview Thank you for choosing the ViperVault cloud replication, backup and disaster recovery service. Using this service you can replicate your
More informationHIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as
HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as required by HIPAA. 1. Definitions. a. Business Associate, as used in this Contract, means the
More informationLAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan
LAW OFFICE SECURITY for Small Firms and Sole Practitioners Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan 1. Introduction CONTENTS 2. Security Consciousness Having a Firm Security
More informationLocal Government Cyber Security:
Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and
More informationDATA RETENTION, STORAGE & DISPOSAL POLICY
THE COUNCIL OF THE INNS OF COURT The Bar Tribunals & Adjudication Service DATA RETENTION, STORAGE & DISPOSAL POLICY Date of implementation: November 2013 Date of last review: April 2015 Date of next review:
More informationSummary Electronic Information Security Policy
University of Chichester Summary Electronic Information Security Policy 2015 Summary Electronic Information Security Policy Date of Issue 24 December 2015 Policy Owner Head of ICT, Strategy and Architecture
More informationManagement and Storage of Sensitive Information UH Information Security Team (InfoSec)
Management and Storage of Sensitive Information UH Information Security Team (InfoSec) Who Are We? UH Information Security Team Jodi Ito - Information Security Officer Deanna Pasternak & Taylor Summers
More informationCritical Data Guide. A guide to handling critical information at Indiana University
Critical Data Guide A guide to handling critical information at Indiana University What is critical information? IU defines critical information as sensitive data requiring the highest level of protection.
More informationService Overview CloudCare Online Backup
Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
More informationNetwork Security. Task 1 Security Measures
Task 1 Security Measures Connecting your computer to a network, particularly the Internet, can put your computer and your data at risk. It is important, therefore, that you take some steps to secure your
More informationIntroduction. Keeping Data Safe and Secure. Topics of Interest. Disclaimer. How Is Data Lost In General? Reasons for Data Loss by 3 rd Parties
Introduction Keeping Data Safe and Secure with Encryption and Online Services This session will look at two aspects of protecting your TRIO program s data through the use of data encryption and online
More informationAxCrypt File Encryption Software for Windows. Quick Installation and Users Guide. Version 1.7 or later. July 2012
AxCrypt File Encryption Software for Windows Quick Installation and Users Guide Version 1.7 or later July 2012 Copyright 2005-2012 Svante Seleborg, Axantum Software AB 2(18) This guide describes how to
More informationIn the Cloud. Scoville Memorial Library February, 2013 ccayne@biblio.org
In the Cloud Scoville Memorial Library February, 2013 ccayne@biblio.org What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the
More informationWhite Paper: NCBI Database of Genotypes and Phenotypes (dbgap) Security Best Practices Compliance Overview for the New DNAnexus Platform
White Paper: NCBI Database of Genotypes and Phenotypes (dbgap) Security Best Practices Compliance Overview for the New DNAnexus Platform April 18, 2013 Overview This White Paper summarizes how the new
More informationWHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery
WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights
More informationHarbinger Escrow Services Backup and Archiving Policy. Document version: 2.8. Harbinger Group Pty Limited Delivered on: 18 March 2008
Document version: 2.8 Issued to: Harbinger Escrow Services Issued by: Harbinger Group Pty Limited Delivered on: 18 March 2008 Harbinger Group Pty Limited, Commercial in Confidence Table of Contents 1 Introduction...
More informationFile Management. Digital Skills Training for Jobseekers
File Management Digital Skills Training for Jobseekers Goals for the class Learn the hardware components Learn what operating systems and software do How to create, move, rename and delete files and folders
More informationComputer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)
Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store)
More informationComputers and Society: Security and Privacy
1 Chapter 12 Computers and Society: Security and Privacy 2 Chapter 12 Objectives 3 Computer Security: Risks and Safeguards What is a computer security risk? 4 Computer Security: Risks and Safeguards 1
More informationAxCrypt File Encryption Software for Windows. Quick Installation Guide. Version 1.6.3. January 2008
AxCrypt File Encryption Software for Windows Quick Installation Guide Version 1.6.3 January 2008 Copyright 2005-2008 Svante Seleborg, Axantum Software AB 2(19) This guide describes how to install and quickly
More informationwww.dowsemurray.co.nz
What we are covering Best practices The cloud Email and document storage Phones and faxes Home office suggestions Small business suggestions Where to buy Where to get support Fun stuff What (I hope) you
More informationWeb-Based Data Backup Solutions
"IMAGINE LOSING ALL YOUR IMPORTANT FILES, IS NOT OF WHAT FILES YOU LOSS BUT THE LOSS IN TIME, MONEY AND EFFORT YOU ARE INVESTED IN" The fact Based on statistics gathered from various sources: 1. 6% of
More informationMinistry of Children and Family Development (MCFD) Contractor s Information Management Guidelines
(This document supersedes the document previously entitled MCFD Contractor Records Guidelines) Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines November
More informationDATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
More informationSecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
More informationResearch Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
More informationII. DISCUSSION ON ENCRYPTION PROGRAMS
Overview of Dropbox Encryption in Cloud Computing S.Raju 1 K.Santhi 2 S.Latha 3 1Professor and HOD, Department of IT, Mahendra Engineering College, Namakkal, India. 2 &3 Assistant Professor, Department
More informationCalifornia State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
More informationINFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
More informationBACKUP AND CONTIGENCY PLANS (DISASTER RECOVERY)
BACKUP AND CONTIGENCY PLANS (DISASTER RECOVERY) PURPOSE The purpose of this policy is to describe the backup and contingency plans, including disaster recovery planning, that will be implemented to ensure
More informationData Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
More informationInformation Security Policy for Associates and Contractors
Policy for Associates and Contractors Version: 1.12 Status: Issued Date: 30 July 2015 Reference: 61418080 Location: Livelink Review cycle: Annual Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...
More informationHow To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
More informationClaim your FREE Scanning trial today. Your guide to Document Scanning, Data Capture & Entry
Claim your FREE Scanning trial today Your guide to Document Scanning, Data Capture & Entry Contents Page 1 Page 2-3 Page 4 Page 5 Page 6 Page 7 Page 8 Why scan your documents? New to scanning? What is
More informationInformation Security Policy. Policy and Procedures
Information Security Policy Policy and Procedures Issue Date February 2013 Revision Date February 2014 Responsibility/ Main Point of Contact Neil Smedley Approved by/date Associated Documents Acceptable
More informationDRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
More informationBACKUP SECURITY GUIDELINE
Section: Information Security Revised: December 2004 Guideline: Description: Backup Security Guidelines: are recommended processes, models, or actions to assist with implementing procedures with respect
More informationEncrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data
More informationDATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has
More informationInformation Technology Acceptable Usage Policy
Information Technology Acceptable Usage Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly
More informationDocument Management Plan Preparation Guidelines
Document Management Plan Preparation Guidelines TABLE OF CONTENTS 1. Purpose of Document 1 2. Definition of Document Management 1 3. Objectives of Document Management 1 4. Terms, Acronyms and Abbreviations
More informationLast modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216
Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First
More informationReplication with TeraStation 3000/4000/5000/7000. Buffalo Technology
Replication with TeraStation 3000/4000/5000/7000 Buffalo Technology Introduction Replication is synchronising a folder on two separate TeraStations in almost real time. It works in only one way not bi-directional,
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationACS Backup and Restore
Table of Contents Implementing a Backup Plan 3 What Should I Back Up? 4 Storing Data Backups 5 Backup Media 5 Off-Site Storage 5 Strategies for Successful Backups 7 Daily Backup Set A and Daily Backup
More informationProtecting Your Data On The Network, Cloud And Virtual Servers
Protecting Your Data On The Network, Cloud And Virtual Servers How SafeGuard Encryption can secure your files everywhere The workplace is never static. Developments include the widespread use of public
More informationEnterprise Information Security Procedures
GHL Network Services Ltd Enterprise Information Security Procedures Prepared By Nigel Gardner Date 16/11/09 1 Contents 1. Openwork s Information Security Policy...3 2. Enterprise Information Security Procedures...3
More informationBackup. Contents. 1 Storage, the base of a backup system. 2 Selection, extraction and manipulation of data. 3 Managing the backup process.
Backup In information technology, a backup or the process of backing up refer to making copies of data so that these additional copies may be used to restore the original after a data loss event. These
More informationSAFEGUARDING PROTECTED HEALTH INFORMATION (PHI): FOCUS POINTS FOR OFFSITE TRANSCRIPTIONISTS
AMERICAN ASSOCIATION FOR MEDICAL TRANSCRIPTION 100 Sycamore Avenue phone: 800-982-2182 Modesto, CA 95354 fax: 209-527-9633 email: aamt@aamt.org web: www.aamt.org SAFEGUARDING PROTECTED HEALTH INFORMATION
More informationBackup and Recovery in Laserfiche 8. White Paper
Backup and Recovery in Laserfiche 8 White Paper July 2008 The information contained in this document represents the current view of Compulink Management Center, Inc on the issues discussed as of the date
More informationCourse: Information Security Management in e-governance
Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security
More informationCongregation Data Security Education
Congregation Data Security Education Data Security Risks Incoming and Outgoing Internet Traffic Remote Access Outbound Email Improperly Discarded Paper Portable Media Devices (i.e. laptops, flash drives,
More informationDeciphering the Safe Harbor on Breach Notification: The Data Encryption Story
Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Healthcare organizations planning to protect themselves from breach notification should implement data encryption in their
More informationData protection. Report on the data protection guidance we gave schools in 2012
Data protection Report on the data protection guidance we gave schools in 2012 Contents 1. Background 2. Summary of recommendations 3. tification 4. Personal data 5. Fair processing 6. Information security
More informationLife Cycle of Records
Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible
More informationPolicies and Procedures for Electronic Protected Health Information (ephi) and Personally Identifiable Information (PII)
Policies and Procedures for Electronic Protected Health Information (ephi) and Personally Identifiable Information (PII) Effective Date: April 10, 2012 Prepared by: Joe Raschke (IT) Table of Contents Purpose
More informationHow To Use Attix5 Pro For A Fraction Of The Cost Of A Backup
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
More informationINFORMATION SECURITY POLICY
INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third
More informationFrequently Asked Questions About WebDrv Online (Remote) Backup
Frequently Asked Questions About WebDrv Online (Remote) Backup GENERAL INFORMATION Why backup? What is online backup? What if we already have a tape backup system? How secure are online backups? What tasks
More informationSecure Storage, Communication & Transportation of Personal Information Policy Disclaimer:
Secure Storage, Communication & Transportation of Personal Information Policy Version No: 3.0 Prepared By: Information Governance, IT Security & Health Records Effective From: 20/12/2010 Review Date: 20/12/2011
More informationInformation Security Guide for Students
Information Security Guide for Students August 2009 Contents The purpose of information security and data protection...1 Access rights and passwords...2 Internet and e-mail...3 Privacy protection...5 University
More informationFile Management Backing up files
What is Backup and why is it done? The word backup refers to making copies of data so that these additional copies may be used to restore the original data in the event of data loss. Basically backups
More informationPGP Desktop Email Quick Start Guide version 9.6
What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages
More informationThe guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files.
Best Practice in Disposing of Records For whom is this guidance intended? This guidance is intended for all University staff that need to dispose of records, on an occasional or regular basis. It is likely
More information