Show simple item record

Security Options for Restricted-use Research Data

dc.contributor.authorMarcotte, John
dc.date.accessioned2019-11-01T16:06:24Z
dc.date.available2019-11-01T16:06:24Z
dc.date.issued2015-05-05
dc.identifier.urihttps://hdl.handle.net/2027.42/151921
dc.description.abstractResearch data often have special security requirements. This presentation will show a framework for categorizing and implementing these special requirements. Restricted-use research data can contain sensitive information as well as personally identifiable information (PII). Sensitive data can cause harm, place in legal jeopardy or damage reputation. PII can lead to disclosure of individuals in research data. Even when PII may have been removed or masked, re-identification may still be possible through inference and linkages. Researchers and institutions are obligated to protect these data. In some circumstances, legal mandates exist. OUTCOMES: Awareness of the special security needs of research and how they differ Learn what options are available to comply with regulations Understanding of what personnel are needed to maintain a secure research environmenten_US
dc.language.isoen_USen_US
dc.subjectRestricted-use Data, Data Securityen_US
dc.titleSecurity Options for Restricted-use Research Dataen_US
dc.typePresentationen_US
dc.subject.hlbsecondlevelStatistics and Numeric Data
dc.subject.hlbtoplevelSocial Sciences
dc.contributor.affiliationumICPSRen_US
dc.contributor.affiliationumcampusAnn Arboren_US
dc.description.bitstreamurlhttps://deepblue.lib.umich.edu/bitstream/2027.42/151921/1/JEMarcotte-Security Options.pdf
dc.identifier.sourceEducause Security Professionals Conferenceen_US
dc.identifier.orcidhttps://orcid.org/0000-0002-6199-4454en_US
dc.identifier.name-orcidMarcotte, John E; 0000-0002-6199-4454en_US
dc.owningcollnameInter-university Consortium for Political and Social Research (ICPSR)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.