Security and Master Data Management
- Master data management
- Meta data management
- Data Preparation
- Data Advisory
- Data Integration
The questions to put when creating, storing or processing reference data (during university research or an analytical study), are the following:
- How is data confidentiality ensured?
- What are the rights of different user groups in accessing and processing data files?
- How is data security ensured?
We address these points in detail in the article below.
How is data confidentiality ensured?
Confidentiality in the research or study environment essentially means careful, planned processing of personal data. Personal data must only be collected and processed to the extent necessary for analysis and unauthorized access to data must be prevented. In cases where it is necessary to include personal identification numbers in the data, there must be clear rules on who can handle these confidential documents.
What are the rights of different user groups?
When data contain personal data, the CNIL (data protection law) requires researchers and companies to complete a description of the file. There is a separate form for the description of commercial analysis and scientific research files data files. The description of the data file adds to the transparency of the processing of personal data. The description must be shown to search participants if they ask to see it. If the data is collected over the Internet, it is also possible to use the confidentiality notice form. The confidentiality notice is a detailed description of a personal data file and provides more detailed information. For the avoidance of doubt, the description of the data file must contain all the information provided to the participants of a search or analysis: mode of collection, processing and use of the data. If the data set is to be archived with personal data, it is recommended that this be indicated in the description of the data file and that this information be provided to the participants of the research or analysis before data collection.
How is data security ensured?
All stages of processing and backup must be secured. Thus, data security involves:
- Personal information collected,
- Information systems,
- Data files
- Data transfers
The data protection system must make it almost impossible to copy, distribute, destroy or modify unintentionally. Backing up data files and preventing unauthorized access to these files is therefore an integral part of data security.
|VISITOR_INFO1_LIVE||5 months 27 days||A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface.|
|YSC||session||YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages.|
|_ga||2 years||The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors.|
|_gat_gtag_UA_49952323_1||1 minute||Set by Google to distinguish users.|
|_gid||1 day||Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously.|
|CONSENT||2 years||YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data.|
|pll_language||1 year||The pll _language cookie is used by Polylang to remember the language selected by the user when returning to the website, and also to get the language information when not available in another way.|