SECURE DATA SERVICE Karen Dennison 4 th Workshop on Data Access, Luxembourg, 26 th March 2012



From this document you will learn the answers to the following questions:

Who funded the British Household Panel Survey?

What is the main feature of the Secure Data Service?

What type of data is used?

Similar documents
Regulations for Data Access

Guide to good practice: micro data handling and security

Research Data Centre network for transnational access - four years of experiences by seven European RDCs

UK Data Service: Data-driven research - Access, analyse, evidence

SECURE LAB BREACHES PENALTIES POLICY

UK Data Archive Data Dictionary

1998 Workplace Employee Relations Survey

Urban Big Data Centre. Data services: Guide for researchers. December 2014 Version 2.0 Authors: Nick Bailey

Microdata Handling and Security

Implementing selection and appraisal policies at the UK Data Archive

From Knowledge to Innovation Supporting the information needs of university business collaboration

ACCESS METHODS FOR UNITED STATES MICRODATA

Critical Infrastructure Private Guarding Company Requirements Checklist

ukdataservice.ac.uk Introducing our data and services

How To Protect School Data From Harm

National Data Archive Application for Access to a Licensed Dataset

ISO 27002:2013 Version Change Summary

Web Site Download Carol Johnston

A Guide to the Research Data Service

Introduction to the Survey Research Data Archive of Taiwan ( 學 術 調 查 研 究 資 料 庫 )

RESOURCES MANAGEMENT FINANCE AND PURCHASING, STAFF, FACILITIES, ENVIRONMENTAL MANAGEMENT AND LEARNING AND RESEARCH INFORMATION SERVICES

Core Fittings C-Core and CD-Core Fittings

CONSUMER DATA RESEARCH CENTRE DATA SERVICE USER GUIDE. Version: August 2015

Archives as full partners in transnational micro-data access. - UK and France examples

INFORMATION SECURITY MANAGEMENT POLICY

HMG Security Policy Framework

"Bring Your Own Device" Brings its Own Challenges

UNIVERSITY RESEARCH ETHICS COMMITTEES IN THE UNITED KINGDOM. Practice, Procedure and Governance

Getting the maximum value from the SCJS: past, present and future

Overview Software Assurance is an annual subscription that includes: Technical Support, Maintenance and Software Upgrades.

The newly adopted Luxembourg Law on electronic archiving. Luxembourg has taken a crucial step towards a paperless office.

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

ESRC Big Data Network Phase 2: Business and Local Government Data Research Centres Welcome, Context, and Call Objectives

INFORMATION SECURITY INCIDENT REPORTING POLICY

Wealth and Assets Survey Introduction to the survey and results. Simon Robinson and Matthew Steel Office for National Statistics

FREQUENTLY ASKED QUESTIONS: CHANGES TO THE NOTIFICATION REQUIREMENTS FOR REGISTERED SEX OFFENDERS

Massachusetts MA 201 CMR Best Practice Guidance on How to Comply

Traineeships (bachelor/master and PhD) in DG Microprudential Supervision IV

CSEW: Re-weighting, re-classification and 2015/16 survey developments

Information Security: Business Assurance Guidelines

Network Security: Policies and Guidelines for Effective Network Management

Utica College. Information Security Plan

document destruction Our passion.

Is your business at risk? DO YOU NEED TO KNOW?

Corporate Information Security Policy

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

Evaluation of the Work Choice Specialist Disability Employment Programme. Technical appendices

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Information Circular

J O B S P E C I F I C A T I O N

NATIONAL RECORDS OF SCOTLAND preserving the past; recording the present; informing the future Census

The Software Experts. Training Courses and Events

How To Manage A Patch Management Process

IDENTITY MANAGEMENT AUDIT REPORT

Remote Access Service (RAS)

E-commerce and ICT Activity, While 22% of businesses generated e-commerce sales, 51% of businesses made e-commerce purchases in 2013.

Network Services Internet VPN

SURE: Helping to get the most out of routinely collected data

JOB DESCRIPTION. To contribute to the formulation, implementation and evaluation of the Nursing and Midwifery Strategy.

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Stakeholders meeting. Ethical protocols and standards for research in Social Sciences today

Security Solutions for HIPAA Compliance

TNS UK PRIVACY & COOKIE POLICY FOR SURVEYS ( Policy )

Research Data Management: The library s role

Corporate Information Security Management Policy

We then give an overall assurance rating (as described below) indicating the extent to which controls are in place and are effective.

Information Management Responsibilities and Accountability GUIDANCE September 2013 Version 1

How To Protect Visa Account Information

Moving From Personal Spreadsheets To Enterprise Solutions The Edge Software Consultancy Ltd.

Cloud Consultancy for Schools. Professional Cloud Adoption Consultancy services for the UK education sector.

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

7 th International Conference on Evidence Based Policing. Chief Superintendent Jonathan Roy

ARCHIVING YOUR DATA: PLANNING AND MANAGING THE PROCESS

Opportunities: Linking Administrative and Survey Data for Statistical Purposes

G-CLOUD IIII FRAMEWORK SERVICE DEFINITION: SCHOOLS HOSTED SERVICE FOR SIMS

Research Data Management Guide

TELEFÓNICA UK LTD. Introduction to Security Policy

Effects on pensioners from leaving the EU

Data Security: Recent Events, Trends and Best Practices

Project Assured Data Access. Henry Hughes

HIPAA and Mental Health Privacy:

Central Bedfordshire Council. IT Acceptable Use Policy. Version 1.7 January 2016 Not Protected. Not Protected Page 1 of 11

DHHS Information Technology (IT) Access Control Standard

Approval of test houses Application form guidance notes

Access Control Policy

ISO Information Security Management Systems Foundation

Protective security governance guidelines

Complaints Management Policy

Learning Management System (LMS) Rubric Virtual School Applicant Edition. Version 1.1 September 2014

Information Management and Security Policy

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES

Tips & Tricks in Contact Manager. Rebecca Whitehead Director, Product Owners

Review of Education and Training on Law Enforcement Data Security in Victoria Police. March 2008 Commissioner for Law Enforcement Data Security

So the security measures you put in place should seek to ensure that:

DPN. Dru Professional Network Code of Ethics and Professional Conduct. Effective from 1 February 2014

Linking SHARE with Administrative Register Data in Denmark. Paul Bingley

How To Behave At A School

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

Transcription:

SECURE DATA SERVICE Karen Dennison 4 th Workshop on Data Access, Luxembourg, 26 th March 2012 Service delivered by the UK Data Archive Supported by the Office for National Statistics Funded by the Economic and Social Research Council

About the Service Working with data owners, we provide researchers with secure access to data that are too detailed, sensitive or confidential to be made available under the standard licences operated by our sister service, the Economic and Social Data Service (ESDS).

About the Service For the academic research community in the UK Delivered by the UK Data Archive Funded by the Economic and Social Research Council Supported by the Office for National Statistics Government and ISO 27001 accredited Officially launched in March 2011

The data Similar to the VML But no need to travel Institutional desktop access We bring the training to you Only final outputs are released All work conducted within the system Learn more at securedata.data-archive.ac.uk/find/

The data ONS Business data Social survey data ESRC-funded/other British Household Panel Survey Understanding Society Millennium Cohort Study linked to a subset of the National Pupil Database English Housing Survey Learn more at securedata.data-archive.ac.uk/find/

Potential new data English Longitudinal Survey of Ageing linked to benefits and National Insurance data Understanding Society linked to the National Pupil Database A version of the National Pupil Database itself Data from other government departments, such as the Department for Work and Pensions Medical/health data Police incident data from Home Office

Application process Order through the Economic and Social Data Service Complete application form vetted by us and data owners Attend mandatory face-to-face training Complete Service User Agreement that requires institutional signature Receive member logon

Training an introduction to the training, the service and other similar services data security and personal responsibility, including legal background, security model, breaches and penalties Statistical Disclosure Control - how to make statistical outputs safe and what principles are used, including hands-on exercises using the Secure Data Service - about the service and how to use it, how to obtain outputs and how to use the service safely

Using the Service Institutional desktop access Secure remote access can t download, copy and paste, print Access to standard software Conduct all research within the secure environment Final outputs are checked by the team for Statistical Disclosure Control before being released

How we re secure secure data technology and procedures Including ISO 27001 staff criminal record checks training and convenience for approved researchers meaningful penalties for breaches UK Statistics Act ESRC backed penalties

Service developments Ongoing Data and documentation enhancements Improvement of back-end systems Measuring impact Safe room onsite as part of a national secure data centre Data without Boundaries EU project Onsite and remote access for non-resident researchers Future Collaboratory Remote access network UK European International

Service usage (2011) 185 researchers trained 79 member logons issued 35 datasets (series) acquired 23 outputs vetted, 19 approved, 4 declined Case studies and current research http://securedata.data-archive.ac.uk/our-data-at-work

Lessons learned When negotiating with National Statistical Institutions involve staff at all levels Manage data owner expectations avoid classification drift Manage researcher expectations Software costs Administration

Contact information E securedata@data-archive.ac.uk W securedata.data-archive.ac.uk T +44 (0)1206 874968