{"id":252,"date":"2025-11-27T13:58:55","date_gmt":"2025-11-27T18:58:55","guid":{"rendered":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/?post_type=chapter&#038;p=252"},"modified":"2026-03-01T22:50:08","modified_gmt":"2026-03-02T03:50:08","slug":"safeguard-your-data","status":"publish","type":"chapter","link":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/safeguard-your-data\/","title":{"raw":"Safeguard Your Data","rendered":"Safeguard Your Data"},"content":{"raw":"<h4><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/plan-your-storage\/\">Previous Lesson<\/a><\/h4>\r\n<h4>Lesson 2 of 18<\/h4>\r\n<h3>Security of your data involves physical, technical, and administrative safeguards.<\/h3>\r\n<div class=\"textbox\">\r\n<h2><strong>The\u00a0<a href=\"https:\/\/ethics.gc.ca\/eng\/policy-politique_tcps2-eptc2_2022.html\" target=\"_blank\" rel=\"noopener\">TCPS 2 (CIHR et al., 2022)<\/a>\u00a0gives the following examples of safeguards:<\/strong><\/h2>\r\n<ol>\r\n \t<li>\"Physical safeguards include the use of locked filing cabinets, and the location of computers containing research data away from public areas\" (p. 58).<\/li>\r\n \t<li>\"Administrative safeguards include the development and enforcement of organizational rules about who has access to personal information about participants\" (p. 58).<\/li>\r\n \t<li>\"Technical safeguards include use of computer passwords, firewalls, anti-virus software, encryption and other measures that protect data from unauthorized access, loss or modification\" (p. 58).<\/li>\r\n<\/ol>\r\n<\/div>\r\n&nbsp;\r\n\r\nYour plan for data storage needs to address not only technical safeguards but should also consider any nondigital data and the physical locations of hardware for storage of any digital data. You also need to comply with any administrative safeguards and guidance provided by your institution and any research partners or collaborators.\r\n\r\nIn planning appropriate data storage, you need to consider the sensitivity of your data and whether or not it requires particular safeguards because of that sensitivity.\r\n\r\n&nbsp;\r\n<div class=\"textbox\">\r\n\r\n<strong><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/part\/module-2-ethics-and-responsibilities\/\">Module 2<\/a> addressed sensitive data, particularly in the context of human participant data and personally identifiable information.<\/strong>\r\n\r\nThe concepts discussed there are important and you need to consider them as you decide upon a plan for data storage and backup that encompasses both risk of data loss and risk of data security in the event of a data breach.\r\n\r\n<\/div>\r\n&nbsp;\r\n\r\nThe remainder of this module discusses physical, administrative, and technical considerations for safeguarding your data.\r\n<h4><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/physical-safeguards\/\">Next Lesson<\/a><\/h4>","rendered":"<h4><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/plan-your-storage\/\">Previous Lesson<\/a><\/h4>\n<h4>Lesson 2 of 18<\/h4>\n<h3>Security of your data involves physical, technical, and administrative safeguards.<\/h3>\n<div class=\"textbox\">\n<h2><strong>The\u00a0<a href=\"https:\/\/ethics.gc.ca\/eng\/policy-politique_tcps2-eptc2_2022.html\" target=\"_blank\" rel=\"noopener\">TCPS 2 (CIHR et al., 2022)<\/a>\u00a0gives the following examples of safeguards:<\/strong><\/h2>\n<ol>\n<li>&#8220;Physical safeguards include the use of locked filing cabinets, and the location of computers containing research data away from public areas&#8221; (p. 58).<\/li>\n<li>&#8220;Administrative safeguards include the development and enforcement of organizational rules about who has access to personal information about participants&#8221; (p. 58).<\/li>\n<li>&#8220;Technical safeguards include use of computer passwords, firewalls, anti-virus software, encryption and other measures that protect data from unauthorized access, loss or modification&#8221; (p. 58).<\/li>\n<\/ol>\n<\/div>\n<p>&nbsp;<\/p>\n<p>Your plan for data storage needs to address not only technical safeguards but should also consider any nondigital data and the physical locations of hardware for storage of any digital data. You also need to comply with any administrative safeguards and guidance provided by your institution and any research partners or collaborators.<\/p>\n<p>In planning appropriate data storage, you need to consider the sensitivity of your data and whether or not it requires particular safeguards because of that sensitivity.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"textbox\">\n<p><strong><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/part\/module-2-ethics-and-responsibilities\/\">Module 2<\/a> addressed sensitive data, particularly in the context of human participant data and personally identifiable information.<\/strong><\/p>\n<p>The concepts discussed there are important and you need to consider them as you decide upon a plan for data storage and backup that encompasses both risk of data loss and risk of data security in the event of a data breach.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>The remainder of this module discusses physical, administrative, and technical considerations for safeguarding your data.<\/p>\n<h4><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/physical-safeguards\/\">Next Lesson<\/a><\/h4>\n","protected":false},"author":2543,"menu_order":2,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-252","chapter","type-chapter","status-publish","hentry"],"part":248,"_links":{"self":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters\/252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/users\/2543"}],"version-history":[{"count":8,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters\/252\/revisions"}],"predecessor-version":[{"id":765,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters\/252\/revisions\/765"}],"part":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/parts\/248"}],"metadata":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters\/252\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/media?parent=252"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapter-type?post=252"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/contributor?post=252"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/license?post=252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}