Storage, backup, transfer, encryption of data



Similar documents
Storing and securing your data

Data storage, collaboration, backup, transfer and encryption

ARCHIVING YOUR DATA: PLANNING AND MANAGING THE PROCESS

Chapter 8: Security Measures Test your knowledge

Backing up your digital image collection provides it with essential protection.

In the Cloud. Scoville Memorial Library February, 2013

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices

SECURITY POLICIES AND PROCEDURES

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)

White Paper: NCBI Database of Genotypes and Phenotypes (dbgap) Security Best Practices Compliance Overview for the New DNAnexus Platform

Guideline to Back Up Your Computer And Important Files

Encryption Policy Version 3.0

VIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide

Introduction to Cloud Storage GOOGLE DRIVE

Dacorum U3A Computer Support Group. Friday 27th March 2015

Local Government Cyber Security:

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

NCTE Advice Sheet Storage and Backup Advice Sheet 7

DATA RETENTION, STORAGE & DISPOSAL POLICY

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan

Office 365 Cheat Sheet OneDrive for Business


Guidelines on use of encryption to protect person identifiable and sensitive information

Management and Storage of Sensitive Information UH Information Security Team (InfoSec)

Service Overview CloudCare Online Backup

Research Information Security Guideline

Data Storage for Research. Michael Pinch

DRAFT Standard Statement Encryption

AxCrypt File Encryption Software for Windows. Quick Installation and Users Guide. Version 1.7 or later. July 2012

Information Security Policy

Backing Up With Acronis True Image 2015

Web Site Download Carol Johnston

Web-Based Data Backup Solutions

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version

Course: Information Security Management in e-governance

Lock and load! - Why ZIP now means business for backups!

CHAPTER 9 System Backup and Restoration, Disk Cloning

AxCrypt File Encryption Software for Windows. Quick Installation Guide. Version January 2008

Protection of Computer Data and Software

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

Backup and Recovery in Laserfiche 8. White Paper

Policies and Procedures for Electronic Protected Health Information (ephi) and Personally Identifiable Information (PII)

10 Things Your Data Center Backup Solution Should Do. Reliable, fast and easy backup is only the beginning

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as

LSE PCI-DSS Cardholder Data Environments Information Security Policy

The Genealogy Cloud: Which Online Storage Program is Right For You Page , copyright High-Definition Genealogy. All rights reserved.

Backup and Recovery FAQs

Cyber Security Best Practices

Newcastle University Information Security Procedures Version 3

Electronic Records Storage Options and Overview

DATA AND PAYMENT SECURITY PART 1

Information Security Policy. Policy and Procedures

FileCloud Security FAQ

Backup. Contents. 1 Storage, the base of a backup system. 2 Selection, extraction and manipulation of data. 3 Managing the backup process.

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

Wazza s QuickStart 15. Leopard Server - Disaster Backup

How To Store Data On A Computer (For A Computer)

Ocster Backup - Rescue System

Acronis True Image 2015 REVIEWERS GUIDE

Information Security Plan effective March 1, 2010

Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines

DAZZLE INTEGRATED DATA BACKUP FEATURE.

Clickfree frequently asked questions

ScoMIS Encryption Service

4 Backing Up and Restoring System Software

Network Security. Task 1 Security Measures

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro

USER MANUAL. v Windows Client January

Introduction. Keeping Data Safe and Secure. Topics of Interest. Disclaimer. How Is Data Lost In General? Reasons for Data Loss by 3 rd Parties

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

UNCLASSIFIED. UK Archiving powered by Mimecast Service Description

IT Data Security Policy

Stable and Secure Network Infrastructure Benchmarks

Transcription:

Storage, backup, transfer, encryption of data Veerle Van den Eynden UK Data Archive Looking after your research data: practical data management for research projects 5 May 2015

Overview Looking after research data for the longer-term and protecting them from unwanted loss requires having good strategies in place for securely storing, backing-up, transmitting, and disposing of data. Collaborative research brings challenges for the shared storage of, and access to, data.

Stuff happens: fieldwork nightmare I m sorry but we had to blow up your laptop. What.all my client case notes and testimony, writing, pictures, music and applications. Years of work. NO!!!! Source: lilysussman.wordpress.com

Stuff happens: data inferno What if this was your university, your office, your data? Fire destroyed a University of Southampton research centre resulting in significant damage to data storage facilities Source: BBC

Backing-up data It s not a case of if you will lose data, but when you will lose data! Keep additional backup copies and protect against: software failure, hardware failure, malicious attacks, natural disasters Would your data survive a disaster?

Backing-up data It s not a case of if you will lose data, but when you will lose data Make sure you don t lose it for good by keeping additional backup copies Protect against: software failure, hardware failure, malicious attacks, loss, accidents etc. Ask yourself: would your data survive a disaster?

Backing-up strategy Consider: What needs to be backed-up? All, some, just the bits you change? What media? External hard drive, DVD, online etc. Where? Original copy, external local and remote copies What method/software? Duplicating, syncing, mirroring How often? Assess frequency and automate the process For how long? How long you will manage these backups for How can you be sure? Never assume, regularly test a restore, and use verification methods

Local data storage All digital media are fallible Optical (CD, DVD) & magnetic media (hard drives, tape) degrade lifespan even lower if kept in poor conditions Physical storage media become obsolete e.g. floppy disks Copy data files to new media two to five years after first created

Storage services Online or cloud services increasingly popular Google Drive, DropBox, Microsoft SkyDrive etc. Accessible anywhere Background syncing Mirror files Mobile apps available Very convenient Everyone uses them, and that s ok BUT precautions must be taken.. Consider if appropriate, as services can be hosted outside the EU (DPA for personal data) Encrypt anything sensitive or avoid services altogether

Other storage options Your university or department may have options available e.g. Secure backed up storage space VPN giving access to external researchers Locally managed Dropbox-like services such as OneDrive and ZendTo Secure file transfer protocol (FTP) server Data repository or archive A repository acts as more of a final destination for data Many universities have data repositories now catering to its researchers, e.g. Research Data Essex UK Data Service has it s own recently launched service called ReShare, for social science data of any kind

File sharing Essex ZendTo www.clinked.com www.huddle.com www.basecamp.com Sharepoint

Demo: SyncToy synchronising For syncing two folders - free download from Microsoft User friendly, at the price of power www.data-archive.ac.uk/media/375817/formattingyourdata_synchronisingexercise.pdf

Verification and integrity checks Ensure that your backup method is working as intended Be wary when using sync tools in particular Mirror in the wrong direction or using the wrong method, and you could lose new files completely Applies to online DropBox-like syncing services too You can use checksums to verify the integrity of a backup Also useful when transferring files Checksum somewhat like a files fingerprint but changes when the file changes

Demo: MD5 checksum checks Calculate the MD5 checksum value of a file to check its integrity, e.g. after back-up or transfer Example using free MD5summer software (www.md5summer.org/) Mac OSX has built in MD5 functionality Online version of demo: www.dataarchive.ac.uk/media/361550/storingyourdata_checksumexercise.pdf

Data security Protect data from unauthorised access, use, change, disclosure and destruction Personal data need more protection always keep separate and secure Who knows who s watching..!

Data security strategy Control access to computers: use passwords, lock your machine when away from it anti-virus and firewall protection, power surge protection all devices: desktops, laptops, memory sticks, mobile devices all locations: work, home, travel restrict access to sensitive materials e.g. consent forms, patient records Control physical access to buildings, rooms, cabinets Proper disposal of data and equipment Even reformatting the hard drive is not sufficient

Encryption Always encrypt personal or sensitive data = anything you would not send on a postcard e.g. moving files, interview transcripts e.g. storing files to shared areas or insecure devices Basic principles Applies an algorithm that makes a file unreadable Need a key of some kind (passphrase, file) to decrypt The UK Data Service recommends Pretty Good Privacy (PGP) More complicated than just a password, but much more secure Involves use of multiple public and private keys Image source: RRZEicons

Encryption software Many free software options that are easy to use BitLocker AxCrypt* Encrypt hard drives, or partitions of hard drives Encrypt files and folders Encrypt portable storage devices such as USB flash drives *Note: take caution when installing AxCrypt to ensure that you uncheck options to install extra bundled software

Data destruction When you delete a file from a hard drive, the chances are it s still retrievable even after emptying the recycle bin Files need to be overwritten (ideally multiple times) with random data to ensure they are irretrievable File on hard disk drive File deleted from disk X X X X File securely deleted from disk

Data destruction software BCWipe - uses military-grade procedures to surgically remove all traces of any file Can be applied to entire disk drives AxCrypt* - free open source file and folder shredding Integrates into Windows well, useful for single files If in doubt, physically destroy the drive using an approved secure destruction facility Physically destroy portable media, as you would shred paper *Note: take caution when installing AxCrypt to ensure that you uncheck options to install extra bundled software

Summary of best practise in data storage and security Have a personal backup/storage strategy original local copy, external local copy and external remote copy Copy data files to new media two to five years after first created Know your institutional back-up strategy Check data integrity of stored data files regularly (checksum) Create new versions of files using a consistent, transparent system Encrypt sensitive data crucial if using web to transmit/share Know data retention policies that apply: funder, publisher, home institution and remove sensitive data securely where necessary