Data Security Flashcards

1
Q

Informational harm

A

When data is used against a participant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who is primarily responsible for following privacy law in a research study?

A

The researchers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following fields could potentially be used to identify someone and must be considered closely when publicly releasing the data?

Movie preferences
Friends
Zip codes and birthdates
Ice cream preferences
Neighbors
A

All of the above.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: Only those individuals that participate in the study can be harmed by a data release.

A

False.

Some study data can provide information about vulnerable populations. For example, data that is shared about one participant may expose information about people within that participant’s population.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some strategies for mitigating risks when making measurement choices?

A

Determine if the sensitive data is necessary for the study
Categorize responses (i.e. income or age) into groups or brackets
Randomized responses
Collecting group responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is IRB approval sufficient in protecting researchers from legal obligations?

A

IRB approval is not sufficient in protecting researchers from legal obligations. It’s the researchers’ responsibility to understand the legal framework that dictates their research.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which scenario represents the best process for transferring sensitive data among research partners?

A researcher encrypts her files and then sends the files and passwords to the files via email
A researcher stores the files in a shared Dropbox folder and shares with research partners
A research manager stores unencrypted data on their computer and then sends an encrypted file to the research team
The research team encrypts all files, stores them on Dropbox, and shares passwords over the phone
All scenarios are sufficient

A

The research team encrypts all files, stores them on Dropbox, and shares passwords over the phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some ways in which data can be de-identified?

A

Redaction/removal
Partitioning
Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: If files are encrypted and the encryption key is lost, the files can be easily retrieved.

A

False.

Encryption keys cannot be easily retrieved. Encryption is one of the best methods for securing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A dataset is considered K-anonymous when:

A

For each record, at least k-1 records contain the same identifying characteristics to make them indistinguishable

K-anonymous is an attribute designated to a dataset that contains identifying characteristics, but because enough records contain the same characteristics, the records cannot be identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transforming data is one control used when making data publicly available. What type of transformation is done when a birthdate field is transformed to age (in years)?

A

Generalization

When you change all the values of a field such as birthdate to age, you are making the data less accurate. Thus, you are generalizing the data. While this helps protect your study participants, it could potentially affect your final results if someone were trying to replicate them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Informed consent document

A

The informed consent document should be seen as an agreement with the researchers and the survey participants. At no point in time during data collection or thereafter should the researchers do something that goes against the signed informed consent clause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A hardening system built for high risk information might include

A

Password complexity enforcement

Default password changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When developing a password, what is a good practice?

A

Passwords tend to be some of the weakest set of controls within a data security system because they are subject to human error. A password manager, such as LastPass, can help people create strong passwords, manage a large number of passwords, and build a multi-factor access system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is one drawback to using Dropbox or Google Drive for hosting data?

A

Data can be decrypted by these companies if they are legally required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What should one consider when preparing data for publishing

A

Could anonymizing the data bias the results
Does suppressing or redacting data make the data less useful to other researchers
Is restricted access to sensitive data a better option than de-identifying data
How much of the data needs to be shared in order for researchers to replicate the results
Does the informed consent clause allow for publishing the data