SECURITY CHECKLIST
Security checklist | ||||
Vulnerability | Course | |||
Yes/No – describe | N/A | |||
1. Data approval from Norfolk State University. If the student conducts primary data collection, check whether the student has obtained the approval from Norfolk State University Institutional Review Board (IRB). | ||||
2. Data approval from external institutions. If the data collection occurs in other institutions, check whether an additional IRB approval is needed. | ||||
3. Sign the consent form. Prior to the data collection, sample participants have to agree upon the participation by signing the informed consent form. Check whether an informed consent form was signed. | ||||
4. Anonymize the data entry. Create a unique identifier to make the data entry anonymous. Keep the identifying information such as name, address, and telephone numbers in separate files. Check whether the dataset was anonymous. | ||||
5. Be vigilant about physical security. Check documents containing sensitive data locked up. | ||||
6. Be vigilant about the password policy. Check whether the computer installing sensitive data is password protected. | ||||
7. De-sensitizing data before transmission via email. Check whether the data was encrypted prior to sharing. | ||||
8. Utilize the “Quick Stego” tool to protect the sensitive data. | ||||
9. Utilize the “WinHip” tool to protect the sensitive data. | ||||
10. Report the sensitive data by ensuring the privacy and confidentiality. |