Starting from the end: What to do when restricted data is released
Published version
Peer-reviewed
Repository URI
Repository DOI
Change log
Authors
Teperek, Marta https://orcid.org/0000-0001-8520-5598
Morgan, R
Ellefson, Michelle https://orcid.org/0000-0003-0407-9767
Kingsley, Danny https://orcid.org/0000-0002-3636-5939
Abstract
© 2017 The Author(s).Repository managers can never be one hundred percent sure of the security of hosted research data. Even assuming that human errors and technical faults will never happen, repositories can be subject to hacking attacks. Therefore, repositories accepting personal/sensitive data (or other forms of restricted data) should have workflows in place with defined procedures to be followed should things go wrong and restricted data is inappropriately released. In this paper we will report on our considerations and procedures when restricted data from our institution was inappropriately released.
Description
Keywords
46 Information and Computing Sciences, 4610 Library and Information Studies
Journal Title
Data Science Journal
Conference Name
Journal ISSN
1683-1470
1683-1470
1683-1470
Volume Title
16
Publisher
Ubiquity Press, Ltd.