Security for Secondary Research-Data
dc.contributor.author | Marcotte, John E | |
dc.date.accessioned | 2020-06-19T15:20:58Z | |
dc.date.available | 2020-06-19T15:20:58Z | |
dc.date.issued | 2020-06-19 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/155620 | |
dc.description.abstract | The required security for secondary research-data depends on their sensitivity and identifiableness. Research-data with more sensitive information and greater potential identifiableness require extra security precautions. Each level adds another restriction layer. The levels are (0) Public-use (0.5) Private-use (1) Restricted-use 1 (2) Restricted-use 2 and (3) Restricted-use 3. Responsibility to protect respondent identities and their information At level 0, public-use data do not require security. At level 0.5, private-use data require encryption and approval. At level 1, data must be encrypted at rest and in transmission. An additional security requirements is blocked Internet. The rooms that house the client and server must be lockable. Data sent to researcher. At level 2, in addition to level 1 protections, nothing including output, data and data extracts can be removed from the computing system until vetted for disclosure risk by trained and authorized personnel. Furthermore, files cannot be added without security review. Researcher comes to data virtually. At level 3, in addition to level 2 protections, processing must be monitored by trained personnel. Notes may not be taken. Moreover, all items such as backpacks and briefcases must be inspected for disallowed materials after a processing session ends. Researcher comes to data in person. This table summarizes the restrictions | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Research Data Security | en_US |
dc.title | Security for Secondary Research-Data | en_US |
dc.type | Working Paper | en_US |
dc.subject.hlbsecondlevel | Statistics and Numeric Data | |
dc.subject.hlbtoplevel | Social Sciences | |
dc.contributor.affiliationumcampus | Ann Arbor | en_US |
dc.description.bitstreamurl | https://deepblue.lib.umich.edu/bitstream/2027.42/155620/1/Secondary Research-Data Security Levels.pdf | |
dc.identifier.orcid | orcid.org/0000-0002-6199-4454 | en_US |
dc.description.filedescription | Description of Secondary Research-Data Security Levels.pdf : Table of security levels for Secondary Research Data | |
dc.identifier.name-orcid | Marcotte, John E; 0000-0002-6199-4454 | en_US |
dc.owningcollname | Inter-university Consortium for Political and Social Research (ICPSR) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.