Data Storage for Research. Michael Pinch



Similar documents
SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Storing and securing your data

Storage, backup, transfer, encryption of data

Data storage, collaboration, backup, transfer and encryption

Data Integrity. Q: Is it OK to use Excel for data entry?

Small Business IT Risk Assessment

HC3 Draft Cloud Security Assessment

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy

Keeping Data Safe. Patients, Research Subjects, and You

Cloud Computing for Education Workshop

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)

Data Storage Options for Research

Research Information Security Guideline

HIPAA ephi Security Guidance for Researchers

CITY UNIVERSITY OF HONG KONG. Information Classification and

Data Security Considerations for Research

HIPAA Training for Hospice Staff and Volunteers

COMPUTER SECURITY PRINCIPLES AND PRACTICES BY

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

HIPAA Training for Staff and Volunteers

Encryption Policy Version 3.0

Information Technology Services Guidelines

Crystal Practice Management Encrypting the Database

Virginia Commonwealth University School of Medicine Information Security Standard

Georgia Institute of Technology Data Protection Safeguards Version: 2.0

Information Security Policy

Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Data Loss Prevention & Mobile Device Management

Introduction. Keeping Data Safe and Secure. Topics of Interest. Disclaimer. How Is Data Lost In General? Reasons for Data Loss by 3 rd Parties

University of Cincinnati Limited HIPAA Glossary

Altius IT Policy Collection Compliance and Standards Matrix

In the Cloud. Scoville Memorial Library February, 2013

OIT OPERATIONAL PROCEDURE

Management and Storage of Sensitive Information UH Information Security Team (InfoSec)

Encrypting your external USB drive on Windows

HiDrive Intelligent online storage for private and business users.

WINSCRIBE HARDWARE SPECIFICATIONS

CHAPTER 9 System Backup and Restoration, Disk Cloning

Vs Encryption Suites

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, What Cloud Computing is and How it Works

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1

Mobile Device Security and Encryption Standard and Guidelines

Purpose: To comply with the Payment Card Industry Data Security Standards (PCI DSS)

Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed)

EndNote Collaboration

Mobile Device Security Is there an app for that?

12 Key File Sync and Share Advantages of Transporter Over Box for Enterprise

Android support for Microsoft Exchange in pure Google devices

Mobile Device Management (MDM) Policies. Best Practices Guide.

Cloud Hosting For Existing ShopWorks Customers

Feature List for Kaspersky Security for Mobile

Managing BitLocker With SafeGuard Enterprise

Cloud Hosting Option For New OnSite Customers

Android Support on Galaxy Nexus, Nexus S, and Motorola Xoom for Microsoft Exchange Policies

10 Backing Up Windows 7

Mobile Device Management (MDM) Policies

Information Security. Annual Education Information Security Mission Health System, Inc.

Northwestern IT Tech Talk

activecho Driving Secure Enterprise File Sharing and Syncing

Computer Backup Strategies

Electronic Records Storage Options and Overview

Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center

Transcription:

Data Storage for Research Michael Pinch

Intro Data storage is a world full of tradeoffs Read vs Write Speed Availability vs Security Cost vs Speed This presentation is to talk about the different types of data we deal with, options for storage, and risks of each We highlight University policy and cite how to get more information

Types of Data PHI Identifiable health information that can be linked to a particular person PCI Account / Cardholder Data Primary account number, cardholder name, service code, and expiration date Legally Restricted (UR Policy) Data which must be protected by law such as PHI, Social Security numbers, and account data Confidential (UR Policy) Information which may be sensitive or proprietary such as personnel records and unpublished

Hard Drive Server Database Share Drives Network Drives Removable Drive CD DVD Cloud USB Email Types of Storage

Share Drives / Network Drives Access is controlled via user account Data is backed up nightly Remotely accessible through VPN

Servers / Databases Servers must be in data center REDCap (Research Electronic Data Capture) may be a viable option Contact Academic IT for more information

Cloud Storage Dropbox is extremely popular for convenience, capacity, and collaboration Dropbox is NOT an approved medium for data storage at URMC, especially legally restricted data URMC has an enterprise contract with Box (the major competitor to Dropbox). Legally, we will be able to store any data in Box we choose. Box allows for syncing to desktop, mobile, web, etc Box allows for collaboration with other non-

Other Cloud Storage URMC is piloting Amazon Web Services In addition to EC2, it offers S3, simple storage solution Inquire with me if you re interested in trying it

Protection Encryption in Rest Encryption in Motion Password Protected < Encrypted

Encryption Methods VPN Provides encryption for data in motion HTTPS Provides encryption for data in motion over the web Zip Software Gives you the option to encrypt a zip file Share the password with someone over a different channel than how you share the file! Secure Email Put!secure in the subject of your email

Encryption Methods CD / DVD Encrypted DVDs are available! USB / Removable /External Drive Buy an encrypted USB Device URMC Managed systems will have software on them in early 2014 that will turn all dumb USB drives into encrypted drives automatically

Encryption Methods Full disk for users PointSec (URMC Enterprise Solution) FileVault (Mac Native Solution) BitLocker (Windows Native Solution) TrueCrypt (Open Source Solution) Most of these tools can be used for full disk encryption or file/folder encryption

Encryption Performance

Encrypted Devices Camera Samsung Galaxy Camera Fully Encrypted! Available in the bookstore - $399 Voice Recorders Olympus DS-3500 - $399 Philips LFH-9600 - $499

Backup / Redundancy URMC File server data backed up for 30 days 14 Days on disk in the Primary Data Center 30 Days on encrypted tape in the Med Ctr Annex Full backups performed weekly Incremental backup performed daily

Compliance HIPAA Requires PHI to be encrypted at rest and in motion FISMA New grants may include FISMA security requirements Medium level security may require encryption of mobile devices and portable storage media PCI All cardholder data must be encrypted in transit Storing cardholder data significantly increases the cost to ensure compliance and is strongly discouraged

Recommended Practices All research data should have backup copies Minimize the use of unencrypted external hard drive, portable devices, and flash drives Store confidential and legally restricted data on network drives / shares Your research data may not contain patient information, but it should remain your data!

Places not to store your data Unencrypted Devices Local Hard Drive Cloud Storage Providers Dropbox Google Drive

Policies Information Security Policies, URMC https://intranet.urmcsh.rochester.edu/policy/hipaa/policymanual/ UR Data Classification http://www.rochester.edu/it/policy/assets/pdf/info RMATION_TECHNOLOGY_POLICY.pdf

What to do in case of loss? Contact the URMC Information Security Office If the lost device is encrypted, no further action should be necessary

Destruction of Data Legally restricted and confidential data must be securely removed when no longer needed Hard drives should be securely wiped before disposal, leaving the organization, or reuse

Questions Contact URMC Information Security Office CISO: Michael_Pinch@urmc.rochester.edu 585.305.5449