Researchers have a responsiblity to ensure research data is secured. Consult Safeguarding your Research by the Government of Canada for more information.
For medium- to high-risk data, details of data storage (including location, 3rd party terms of use, access and security) should be specified in the Informed Consent materials available from the Research Ethics Board (SREB).
All accounts on your devices (e.g., computer, phone) should be protected by a password, according to Sheridan’s Password Management Procedure. To avoid loss of access if team members leave Sheridan, passwords should be used at the device and/or account level, not to control access to individual research data files or folders. For example, grant access to files and folders through SharePoint permissions, rather than unique passwords.
For medium- to high-risk data, data must be collected and stored on password-protected devices. Storage on static devices in a secure location such as on a desktop computer in a locked office or an appropriately protected server is recommended (medium-risk) or required (high-risk).
Ensure your password:
Ensure that your password is also:
Passwords must never be shared with anyone, written down or stored in an insecure manner. Consider using a password manager to help you create, store, and remember your passwords. Passwords should be updated in the following cases:
To enhance the security of sensitive accounts, all individuals are required to implement MFA (also known as 2 Factor Authentication, or 2FA), where available. Enabling multi-Factor Authentication (MFA) requires that more than one code or ‘Factor’ be provided for identity verification to login, such as a password and a security code sent to your phone number or generated by an authenticator app (e.g. Microsoft Authenticator).
Encryption is the process of making information unreadable to protect it from unauthorized access. After information has been encrypted, a secret key or password is needed to unencrypt it and make it readable again.
For medium- to high-risk data, encryption is recommended at rest and in transit for all medium-risk data, wherever feasible, and must be used at rest and in transit for all high-risk data.
To encrypt individual files:
To encrypt your whole drive:
Data at rest:
Data in transit (unsecure or wireless networks, websites, cloud services): encryption is required for high-risk data.
Safeguarding and management of the encryption keys must be established to maintain security, avoid compromise, and ensure availability of information. Use strong passwords or passphrases and keep encryption keys secure (Key Strength: Minimum 128-bit key is required; 512-bit key is recommended). Industry best practices suggest the use of Azure Key Vault to standardize the management of keys, secrets, and certificates.
Contact IT Services for additional information and guidance.