Starting from the end: What to do when restricted data is released

Marta Teperek, Rhys Morgan, Michelle Ellefson, Danny Kingsley

Research output: Contribution to journalArticlepeer-review

15 Downloads (Pure)

Abstract

Repository managers can never be one hundred percent sure of the security of hosted research data. Even assuming that human errors and technical faults will never happen, repositories can be subject to hacking attacks. Therefore, repositories accepting personal/sensitive data (or other forms of restricted data) should have workflows in place with defined procedures to be followed should things go wrong and restricted data is inappropriately released. In this paper we will report on our considerations and procedures when restricted data from our institution was inappropriately released.

Original languageEnglish
Article number10
Number of pages6
JournalData Science Journal
Volume16
DOIs
Publication statusPublished - 2017
Externally publishedYes

Keywords

  • Data anonymisation
  • Data release
  • Data security
  • Personal/sensitive data
  • Repository security
  • Restricted data

Fingerprint

Dive into the research topics of 'Starting from the end: What to do when restricted data is released'. Together they form a unique fingerprint.

Cite this