Data protection, privacy, and confidentiality: Difference between revisions

no edit summary
m (make us sound less useless)
No edit summary
Line 3: Line 3:
<translate>
<translate>


== Does Compute Canada offer any resources dedicated to handling personal data, private data, or sensitive data, such as (for example) human clinical research data? == <!--T:1-->
== Are there any resources dedicated to handling personal data, private data, or sensitive data, such as (for example) human clinical research data? == <!--T:1-->


<!--T:2-->
<!--T:2-->
We don’t run any resource that is specifically designated for sensitive data at this time.  
We don’t have resources specifically designated for sensitive data at this time.  


<!--T:3-->
<!--T:3-->
Our resources are all administered following best practices for academic research systems, and we devote considerable effort to ensuring data integrity, confidentiality, and availability.  However, none of the resources is formally certified as meeting specific security or privacy assurance levels which may be required for certain datasets. For the most part, we provide shared resources, shared networks, shared nodes, shared memory, and data is not guaranteed to be encrypted at rest. We offer the standard Linux filesystem segregation and access control to files and directories, and our sysadmins do have access to all this material when necessary or when authorized by their owners.  
Our resources are all administered following best practices for academic research systems, and we devote considerable effort to ensuring data integrity, confidentiality, and availability.  However, no resource is formally certified as meeting specific security or privacy assurance levels which may be required for certain datasets. For the most part, we provide shared resources, shared networks, shared nodes, shared memory, and data is not guaranteed to be encrypted at rest. We offer the standard Linux filesystem segregation and access control to files and directories, and our sysadmins do have access to all this material when necessary or when authorized by their owners.  


<!--T:4-->
<!--T:4-->
Responsibility for data protection and data privacy rests ultimately with the researcher. Please see Privacy and Data Protection Policy section 5.2, and Terms of Use paragraph 3.12, at https://ccdb.computecanada.ca/agreements/user_index.  
Responsibility for data protection and data privacy rests ultimately with the researcher. Please see Privacy and Data Protection Policy section 5.2, and Terms of Use paragraph 3.12, at https://ccdb.computecanada.ca/agreements/user_index.  


<!--T:5-->
<!--T:5-->
Support staff can give guidance on handling of sensitive data, including advice on access control, encryption, storage, and transmission.  Please contact [[technical support]] for assistance.
Support staff can give guidance on handling of sensitive data, including advice on access control, encryption, storage, and transmission.  Please contact [[technical support]] for assistance.


== What does Compute Canada do to protect my data against hardware failure? == <!--T:6-->
== How do you protect my data against hardware failure? == <!--T:6-->


<!--T:7-->
<!--T:7-->
Line 26: Line 26:
* Nearline storage provides duplicate copies of data on tape.
* Nearline storage provides duplicate copies of data on tape.


== What does Compute Canada do to protect my data against unauthorized access? == <!--T:8-->
== How do you protect my data against unauthorized access? == <!--T:8-->


<!--T:9-->
<!--T:9-->
Line 32: Line 32:


<!--T:10-->
<!--T:10-->
To protect against unauthorized access through hardware, only approved personnel can physically access the infrastructure. Storage devices which are removed due to hardware failure are either destroyed or already encrypted or erased before being returned to the vendor for a replacement.
To protect against unauthorized access through hardware, only approved personnel can physically access the infrastructure. Storage devices which are removed due to hardware failure are either destroyed or already encrypted or erased before being returned to the vendor for replacement.


<!--T:11-->
<!--T:11-->
rsnt_translations
56,420

edits