Data security
Things to know
When handling personal data or sensitive business data (e.g. financial data, contracts, school management documents), the law stipulates special protection.
Personal data
- Personal data is when a person can be identified. The external page Federal Act on Data Protection applies for personal data.
- For personnel data, the Guidelines on the Protection and Handling of Personnel Data at ETH Zurich (RSETHZ 612) also apply.
Business data
Business data is subject to the regulations of storing business documents (Art. 81, Financial Regulations of the ETH Zurich (RSETHZ 245), Directive on the Archving and Destruction of Business Documents, RSETHZ 245.5)
Loss of such data can significantly hamper meeting legal provisions of ETH Zurich. Such data shall accordingly be protected from a technical point of view in particular (Art. 14-15, ETH Zurich Acceptable Use Policy for Information and Communications Technology (“BOT”) and Appendix).
Research data
Handling research data also is subject to legal provisions: Guidelines for Research Integrity and Good Scientific Practice at the ETH Zurich
Third party requirements
Research funding institutions (SNF, CTI, EU, etc.) also lay down requirements for data management. This may concern, for example, Open Access or data management plans.
Secrecy
For the exchange of certain data, the parties may agree that they are to be kept confidential. For this purpose, a confidentiality agreement (NDA) is concluded - already in the run-up to the cooperation. It is recommended that research NDAs be submitted to ETH Transfer for review before signing. General questions about NDAs can be answered by the Legal Office.
- When using personal data in research, the affected persons must be informed of the use of their data and they have to agree to the use (informed consent). This also applies to the collection of biological material.
- Collecting personal data on the basis of a pyramid scheme is on principle not permitted. This means it is not allowed to inquire one person about other persons' data.
- Research data have to be stored according to Guidelines for Research Integrity and Good Scientific Practice at the ETH Zurich to ensure the scientific verifiability of the research results.
- Anyone who stores health-related personal data or biological material for research purposes must protect this data by taking appropriate operational and organisational measures. These include, for example, the restrained granting of access to the data (only where necessary), encryption, or anonymisation (Art. 5 HFV; Art. 18 KlinV). Information can be obtained from the Ethics Commission.
- If there are no special deletion periods, personal data (e.g. research data under the external page Human Research Act) must be permanently archived or deleted when they are no longer required for their purpose.
Property of ETH Zurich
In principle, primary data produced by research projects at ETH Zurich remain the property of ETH Zurich. ETH Zurich researchers are not obliged to make the data accessible outside the project team until they have processed, evaluated or published it themselves.
If you are no longer part of the project team
In each research project, a professor, in consultation with the respective project leader, will determine and record in writing which participants are to retain access to the primary data after leaving the project team and for what purposes they may use this data and materials.
Making primary data accessible
After completion of the project and publication of the results, the research results and the corresponding source data should be made publicy available (as long as no confidentiality interests or contractual obligations conflict with this): Open Access Policy of ETH Zurich
Research Data Management and Digital Curation
Secure storage of research data for a predefined period of time and publication of research data including the provision of a Digital Object Identifier.
Scientific IT Services (SIS)
Supporting departments and research groups in scientific computing and handling of research data. SIS offers consulting, technical solutions and services for the management of active research data.
ETH Zurich University Archives
The ETH Zurich University Archives offer advice on records management, archiving of business documents and is contact point for professors facing retirement.
Legal Office
The Legal Office can help with questions on data protection, among other things.
Planning and Structure
Define clear data handling rules within your research or project group and document them in a data management plan. The Data Management Checklist provides important information on this topic.
- Data (incl. primary data) should be filed with metadata.
- Classify the data in terms of confidentiality, integrity and availability.
- Classifications of ETH Zurich regarding confidentiality are: public, internal, confidential
- Further information can be found in the Directive on "Information Security at ETH Zurich".
- Define access rights, give each role (researcher, administrator, supervisor, etc) only the rights that are really necessary.
- If necessary, define an encryption procedure.
- Define a version control system.
- Define a naming scheme.
- Storage
- Use DOIs for permanent storage and identification of data.
DOI = Digital Object Identifier is a serial code for objects such as electronic documents. - Serious re-use of foreign research data is only possible if the data is fully documented with its context. Therefore, make sure that such context information is stored together with your data and not scattered in different places.
- Avoid storing data on offline media (CDs, DVDs, USB sticks, tape), which can be lost, broken or forgotten.
- Programs and file formats change over time, so it may not always be possible to read old file formats. The Research Data Management and Digital Curation Unit makes recommendations on the suitability of file formats for archiving.
- Use DOIs for permanent storage and identification of data.
Implementation
- Stick to the data management plan.
- Document how data has been prepared or what it contains and for what purpose it can be used.
- Keep a laboratory journal. Write ReadMes.
- Document copyrights and intellectual property to verify who holds the intellectual property rights to the data.
- Control and manage access rights to data and systems. Keep them up-to-date.
Clean up after project end
After completion of the project ensure that data and materials are stored for the period relevant to the subject area and that they are properly destroyed in due time.
Respect data classification
Note the classifications of the datasets (in terms of confidentiality, availability and integrity) with which you work. If the data was provided by third parties, you must also take into account their classifications.
Lock documents away
Keep sensitive physical documents and data media under lock and key.
Encrypt sensitive data and documents
Store sensitive data in encrypted form if you want to ensure that only persons in possession of the key can access it.
Careful handling
Be careful when storing data (physical or cloud-based), deleting data, or uploading data to websites. This will help prevent data you create or use from being inadvertently distributed or published.
Transmit sensitive data only if encrypted
Sensitive personal data, confidential data and other sensitive data may only be transmitted in encrypted form.
Please make sure
- that data transmission to the target system is encrypted (https://)
or - encrypt the data, e.g. with WinZip
or - send the data with an encrypted email.
Process sensitive data only on trustworthy computers
If you cannot be sure whether the latest security patches are installed on a system, whether an up-to-date virus scanner is running, whether only trusted persons had access, then you should not work with the system, especially not if you want to process sensitive data.
Use storage services
Use a professionally managed storage service (from IT Services or provided by your IT Support Group). This is the best and most reliable way to store your data.
Self-managed storage
If you need (or want) to manage your storage yourself, use network-attached-storage (NAS) that uses RAID hard drives. Make sure to always install the latest security updates and keep the NAS in a locked and secure place.
External hard drives
Only use external hard drives if you have separate backup copies. When storing data on an external hard drive, you risk losing data as it may be physically removed or lost.
Private cloud storage
Only use a private cloud storage systems hosted by ETH (e.g. polybox).
External cloud services
If no other solution is available, external cloud services can be used for non-sensitive data, provided all superordinated compliance requirements are met. It is strongly recommended that the ETH Zurich Legal Office be consulted.
Support
Your IT support can help you with data storage.
Performing backups
Make sure that backups are performed and inform yourself about the retention periods.
Check recovery
Check sporadically whether you can restore and use the data from the backup.
Using the backup service
- Use a professionally managed backup service (from IT Services or your IT Support Group). This is the best and most reliable way to back up your data.
- Approximately 150 terabytes of data are backed up at ETH Zurich every day. The trend is rising. If you expect large amounts of data, contact the IT Support Group in charge so that necessary resources can be planned.
Self-managed backups
If you decide to manage your backups yourself, please keep the following in mind:
- Backup frequency
- Retention periods
- Spatial separation between the respective copies of the data
- Store backup media in a safe place
Superiors, decision-makers
Define a procedure for how data is transferred in an orderly manner when employees leave the company or change internally.
Leaving persons
Before changing your job or project, hand over all business-relevant data and research information to your successor or to your superior.
Encrypted data must either be transferred with the corresponding private key or decrypted and re-encrypted with the key Private Key of the successor.