Ashley Pittman wrote: > On 1 Mar 2010, at 19:08, Jonathan Dursi wrote: > >> These are all good things to keep in mind. >> >> There must be people out there with users who do biomed work with its >> attendant confidentiality issues, > or users who work on commercial confidential data sets -- engineering or > otherwise.
Hi all, The usual answer you will get from lawyers and compliance officers is that: "You should take reasonable care to ensure that data is kept appropriately." However, most (all?) biomedical projects should have some sort of data-access agreement (DAA). That document states what patients have given consent for, who should have access to the data and under what conditions. That should give you a good starting point for working out what your security policy should be. (If you are going to be doing systems stuff for the group, you should also have signed the agreement.) Generally speaking, the greater the chance of being to trace data back to a specific individual, then the more paranoid you have to be about the data. It is up to the primary investigators, lawyers, compliance officers and sys-admins to turn that into a security policy. At Sanger, we run through the whole range of security policies. We have projects that deal routinely with full medical histories. They run on a set of machines physically separated from the rest of our datacentre infrastructure, with data held in encrypted databases with 2 factor logins. Data is not allowed to be removed from that setting. We have other projects that are using anonymised datasets, and that data can be held on our main cluster with the appropriate unix access controls. In the future we will probably have projects whose security requirements would be somewhere in the middle of those two extremes. The key do dealing with those projects are the words "reasonable care". Would we worry about data being kept un-encrypted in memory? Probably not. Would we put in place an automated audit process to ensure data kept on filesystems have appropriate ACLs set? Probably yes. And remember, if someone goes out of their way to get access to data that they should not, then that is a contravention of the AUP and/or local computer crime laws. (You do make your users sign an AUP, right...?) There are some example DAAs below. https://www.wtccc.org.uk/info/access_to_data_samples.shtml https://www.wtccc.org.uk/docs/Data_Access_Agreement_v17.pdf http://www.icgc.org/icgc_document/policies_and_guidelines/informed_consent_access_and_ethical_oversight Cheers, Guy -- Dr. Guy Coates, Informatics System Group The Wellcome Trust Sanger Institute, Hinxton, Cambridge, CB10 1HH, UK Tel: +44 (0)1223 834244 x 6925 Fax: +44 (0)1223 496802 -- The Wellcome Trust Sanger Institute is operated by Genome Research Limited, a charity registered in England with number 1021457 and a company registered in England with number 2742969, whose registered office is 215 Euston Road, London, NW1 2BE. _______________________________________________ Beowulf mailing list, Beowulf@beowulf.org sponsored by Penguin Computing To change your subscription (digest mode or unsubscribe) visit http://www.beowulf.org/mailman/listinfo/beowulf