Security and Master Data Management
- Master data management
- Meta data management
- Data Preparation
- Data Advisory
- Data Integration
The questions to put when creating, storing or processing reference data (during university research or an analytical study), are the following:
- How is data confidentiality ensured?
- What are the rights of different user groups in accessing and processing data files?
- How is data security ensured?
We address these points in detail in the article below.
How is data confidentiality ensured?
Confidentiality in the research or study environment essentially means careful, planned processing of personal data. Personal data must only be collected and processed to the extent necessary for analysis and unauthorized access to data must be prevented. In cases where it is necessary to include personal identification numbers in the data, there must be clear rules on who can handle these confidential documents.
What are the rights of different user groups?
When data contain personal data, the CNIL (data protection law) requires researchers and companies to complete a description of the file. There is a separate form for the description of commercial analysis and scientific research files data files. The description of the data file adds to the transparency of the processing of personal data. The description must be shown to search participants if they ask to see it. If the data is collected over the Internet, it is also possible to use the confidentiality notice form. The confidentiality notice is a detailed description of a personal data file and provides more detailed information. For the avoidance of doubt, the description of the data file must contain all the information provided to the participants of a search or analysis: mode of collection, processing and use of the data. If the data set is to be archived with personal data, it is recommended that this be indicated in the description of the data file and that this information be provided to the participants of the research or analysis before data collection.
How is data security ensured?
All stages of processing and backup must be secured. Thus, data security involves:
- Personal information collected,
- Information systems,
- Data files
- Data transfers
The data protection system must make it almost impossible to copy, distribute, destroy or modify unintentionally. Backing up data files and preventing unauthorized access to these files is therefore an integral part of data security.