Have a personal or library account? Click to login
Starting from the End: What to do when Restricted Data is released Cover

Starting from the End: What to do when Restricted Data is released

Open Access
|Mar 2017

Abstract

Repository managers can never be one hundred percent sure of the security of hosted research data. Even assuming that human errors and technical faults will never happen, repositories can be subject to hacking attacks. Therefore, repositories accepting personal/sensitive data (or other forms of restricted data) should have workflows in place with defined procedures to be followed should things go wrong and restricted data is inappropriately released. In this paper we will report on our considerations and procedures when restricted data from our institution was inappropriately released.
Language: English
Submitted on: Oct 28, 2016
Accepted on: Mar 9, 2017
Published on: Mar 23, 2017
Published by: Ubiquity Press
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2017 Marta Teperek, Rhys Morgan, Michelle Ellefson, Danny Kingsley, published by Ubiquity Press
This work is licensed under the Creative Commons Attribution 4.0 License.