Show simple item record

Security for Secondary Research-Data

dc.contributor.authorMarcotte, John E
dc.date.accessioned2020-06-19T15:20:58Z
dc.date.available2020-06-19T15:20:58Z
dc.date.issued2020-06-19
dc.identifier.urihttps://hdl.handle.net/2027.42/155620
dc.description.abstractThe required security for secondary research-data depends on their sensitivity and identifiableness. Research-data with more sensitive information and greater potential identifiableness require extra security precautions. Each level adds another restriction layer. The levels are (0) Public-use (0.5) Private-use (1) Restricted-use 1 (2) Restricted-use 2 and (3) Restricted-use 3. Responsibility to protect respondent identities and their information At level 0, public-use data do not require security. At level 0.5, private-use data require encryption and approval. At level 1, data must be encrypted at rest and in transmission. An additional security requirements is blocked Internet. The rooms that house the client and server must be lockable. Data sent to researcher. At level 2, in addition to level 1 protections, nothing including output, data and data extracts can be removed from the computing system until vetted for disclosure risk by trained and authorized personnel. Furthermore, files cannot be added without security review. Researcher comes to data virtually. At level 3, in addition to level 2 protections, processing must be monitored by trained personnel. Notes may not be taken. Moreover, all items such as backpacks and briefcases must be inspected for disallowed materials after a processing session ends. Researcher comes to data in person. This table summarizes the restrictionsen_US
dc.language.isoen_USen_US
dc.subjectResearch Data Securityen_US
dc.titleSecurity for Secondary Research-Dataen_US
dc.typeWorking Paperen_US
dc.subject.hlbsecondlevelStatistics and Numeric Data
dc.subject.hlbtoplevelSocial Sciences
dc.contributor.affiliationumcampusAnn Arboren_US
dc.description.bitstreamurlhttps://deepblue.lib.umich.edu/bitstream/2027.42/155620/1/Secondary Research-Data Security Levels.pdf
dc.identifier.orcidorcid.org/0000-0002-6199-4454en_US
dc.description.filedescriptionDescription of Secondary Research-Data Security Levels.pdf : Table of security levels for Secondary Research Data
dc.identifier.name-orcidMarcotte, John E; 0000-0002-6199-4454en_US
dc.owningcollnameInter-university Consortium for Political and Social Research (ICPSR)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.