Role of ICT in Data Production (Unit-4)
Role of ICT in Data Production (Unit-4)
uaset
modiication,and
loss
communication technology (ICT) security measures are necessay to protect confidential information from unauthorised use.
trnemision ofdata,inckuding source data, inkagekeys, aswel asthat sociatedwth remote orelectronic acoesstointegrated datasets,
m a y consideration for data integration projects. The foloing security measures for the traqenission of data are essertial for al data linkage
projects:
Asecure inernet gateway. For high risk projects this gateway must be reviewed annually by the concemed authorities
Encoyption
omation.ot al electonic
Elecronic data transer
data transfer shouldto restrit
only occuraccess to infomation
where there is a securetointernet
suthorised users and prevent deciphering of inkencepted
gateway.
Use
that f
al a courier,i there
infomation aretechnical,
contained secary
on the disc ormedium
or other otherreasons
wil bethat restrictthetranser of dataelectronicaly.Atmedia level,tis epected
en ypted
The following measures are recommended as best practice to esurethat data is stored and destroyed securely for all data integration projects;
Protocols and control mechanismsto prevent storage ofsensitive or confidertisl infomation on portable devices such asaptops orthurmb
drives unless they are both encrypled and password protected. This requirement is consistent wih the Protective Securiy Framework.
Storage of datasets associated with an intogration project on a password protected stand-atone computer in a secure room or on a
password protecled server on a computer network wih a secure firewal.
To presere privacy and confidentiaity. identilying infomation (such as product name, ingredient name, supplier details, etc) should be
used only orthe purpose of creating linkage keys and not stored on theintegrated dataset, unless speciicaly required and approved for
the project purpose and enabled by management
Project specic inkage kersshoud not enable inksto be established with other datasets or projects. Thecode (agorithm) used to create
linkage keys shoud also be kept confidential to prevent anyone re-identilying records through their knowledge of the key.
Once the approved pupose of the project is met, the integrated dataset and project inkage keys should be destroyed in a way that
compies with secure disposal requirements, unless retention of the dataset is required for long-tem studies
Secure disposal of eecronic records could incude: overwriing records so that the undertying, previously stored data is rendered beyond easy
recovery, delation of backup iies, and for very sensitive infommaton at high risk, degaussing might be considered (this involves demagnetisation
using alternating electric aurentsand renders any previously stored data onthe storage media as unreadable). The reoommended fom of
destruction di paper records or physical media, such as DVDs, is shredding.
wiy
Stondard Grade Adminisrahion Renlrewahire Coun
The main
requirements of the Act are:
Any electronically stored information must have been come
by legally
The information must be
up-to-date and accurate. t should also be relevant.
Personal data must be held and used
only for the specified purposes.
Data should be stored i a
ensure no
secure system, where measures have been taken o
unauthorised access, alterahion or destruction of the data.
Infomation should not be kept on file for
longer than is necessary
Individuals must have open access to any information held
opportunity to comect or erase any intormation which is notthem and must have
on
he
correct.
stored on
files are hard drives, file
This is a spoce saving method of filing, as all cabinets.
servers or floppy discs which
are much more compact than filing
Core Notes
Storage&RetrievadofInlormation Page7