Unrestricted / Open Data:
These are data that may be made freely available to anyone, anywhere and/or at any time. E.g., thoroughly anonymized data and/or data which have been assessed as posing no risk of harm if made openly available.
Restricted Data:
These are data that cannot be shared in their present form, at the present time, or possibly ever at all - such as unredacted personal information, data under a publishing embargo, proprietary research and/or data covered by a non-disclosure agreement.
Depending on the confidentiality/sensitivity of the data you are collecting you may need to restrict access to your files and devices to prevent unauthorized access. The following is not an exhaustive list. For a more detailed discussion of this topic see Princeton University's guide to Best Practices for Data Analysis of Confidential Data. |
Strategies include:
Encryption is an important tool in helping to keep sensitive data secure.... Data may be encrypted at many levels, at multiple stages of the data lifecycle, and through a variety of software and hardware packages. Which one you choose depends on a variety of factors such as your operating system and the use case that you are concerned about (University of Auckland Research Hub. Encryption). |
If you are using a College laptop or desktop your files are automatically encrypted. The same is true if you save your files to our enterprise accounts for SharePoint, OneDrive and/or Teams. Ensure that any external research partners are committed to storing/safeguarding your shared data in accordance with the legal and institutional requirements that apply to you as a Douglas College employee.
If you are using your personal device to save your files: you can encrypt your entire device or specific files, whichever makes the most sense for your project. Once encrypted, the only way to access your device or files is by entering the correct password.
Alternatively you can map OneDrive to your local device and save your files in OneDrive instead.
Note, College-issued laptops and desktop computers automatically encrypt your files and password protect access so it’s preferable to use them rather than personal devices. However, sometimes it’s more convenient or practical to use a personal device – particularly mobile devices such as smart phones, tablets or digital cameras/recorders.
When using personal mobile devices, users are required to adhere to the same security protocols that apply to using College-issued mobile devices, which include but are not limited to:
For the full list of requirements, see the Mobile Device Security Standard on the Information Security page in DC Connect.