(1) This Guideline provides details on data sensitivity indicators and advice for assessing and classifying data as highly sensitive, sensitive or general. It also documents appropriate security measures and storage options for active data according to its sensitivity classification. (2) This Guideline applies to anyone who conducts research or research support under the auspices of Macquarie University, as per the Macquarie University Code for the Responsible Conduct of Research. (3) The list of data sensitivity indicators within this Guideline is not exhaustive. Where a researcher believes their data may be sensitive or has queries relating to this Guideline they are encouraged to contact a Research Data Steward. (4) The Guideline assists researchers to apply the principles of the Macquarie University Code for the Responsible Conduct of Research to the management of research data at Macquarie University and to direct their implementation of the expected standards. (5) Refer to the Research Data Management Policy. (6) Refer to the Research Data Management Procedure. (7) Research Data may contain information of a personal or sensitive nature which must be protected against unwarranted disclosure. (8) Sensitive information may include but is not limited to: health-related data; personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs; financial information; genetic data or biometric data processed solely to identify a human being. Sensitive information may also relate to information which may pose a risk to cultural resources, the environment or animals (such as the location of endangered species or threatened archaeological remains), to potentially valuable intellectual property, or to national security. (9) Sensitive information must be: protected against unwarranted disclosure, monitored for potential data breaches resulting in such disclosure and amenable to audit in the event of an actual or alleged data breach. (10) Access to sensitive information must be safeguarded with appropriate data security practices. (11) Data security is a shared responsibility between the University and the researcher (refer to Cyber Security Policy). (12) Protection of sensitive information may be required for legal or ethical reasons, for issues pertaining to personal privacy and welfare, for cultural or environmental factors, for proprietary considerations, or to meet regulatory requirements. (13) Research Data at Macquarie University can be grouped into three categories depending upon the sensitivity of its information. The categories are: (14) Data is generally considered either Sensitive or Highly Sensitive if it contains Identifiable 'personal information' or identifiable health information. This includes: (15) Data may also be deemed sensitive due to cultural considerations, environmental, or proprietary considerations. (16) The type of 'personal information' contained in the data, or other aspects of the data, will determine if it should be classified as 'Highly Sensitive' or 'Sensitive' as follows. (17) Research Data is considered highly sensitive when: (18) Data is considered sensitive when it: (19) Data is classified general when it is: (20) Examples of how research data can be classified according to its sensitivity, and how that relates to the Information Classification and Handling Procedure include (but are not limited to) the examples provided below: (21) Data capture or collection practices vary from discipline to discipline and must be specified in your Data Management Plan. (22) Researchers must use approved platforms for the collection, capture, or collation of sensitive or highly sensitive data where such platforms are available. The approved platforms are listed in Table 1: Data Collection, Storage, Archiving, and/or Publication Platforms. (23) If no platform exists for your research discipline consult a Research Data Steward regarding the process for proposing use of an unapproved data platform. (24) The Macquarie University approved storage options for data can be found in Table 1: Data Collection, Storage, Archiving, and/or Publication Platforms (appropriate security measures as per clauses 28-30 must be implemented). (25) Custom storage solutions using Australia-based commercial web services (e.g., AWS, Azure, Google Cloud) or peak facilities (e.g., NCI, Pawsey) may also be acceptable but will require approval by a Research Data Steward via a Data Management Plan in FoRA. (26) Bespoke on-site storage solutions may be possible and will require approval by a Research Data Steward via a Data Management Plan in FoRA. If no platform exists for your research discipline consult a Research Data Steward regarding the process for proposing use of an unapproved data platform. (27) Table 1: Data Collection, Storage, Archiving, and/or Publication Platforms outlines the storage options endorsed by the University (staff access only). (28) Security practices must be applied to all active data to prevent unauthorised access or accidental loss. The required security controls are summarised in Table 2: Security Controls according to Data Sensitivity Classification. (29) The sensitivity level of the data determines the security practices that must be applied during data management. (30) Researchers are expected to obtain assistance from a Research Data Steward or IT (if needed) to meet the following requirements: (31) The Macquarie University approved archiving and publication platform options can be found in Table 1: Data Collection, Storage, Archiving, and/or Publication Platforms. (32) Security practices must be applied to all archived data to prevent unauthorized access. (33) The sensitivity level of the data determines the security and access practices that must be applied when data is archived and published. (34) Table 2: Security Controls according to Data Sensitivity Classification outlines the security measures that are expected to be applied (staff access only). (35) Definitions specific to this Guideline are contained in the Research Data Management Policy.Research Data Sensitivity, Security and Storage Guideline
Section 1 - Purpose
Scope
Section 2 - Policy
Section 3 - Procedures
Section 4 - Guidelines
Background
Part A - Sensitive Information within Research Data
Data Sensitivity Indicators
Part B - Research Data Security
Data Collection
Active Data Storage
Table 1: Data Collection, Storage, Archiving, and/or Publication Platforms
Active Data Security
Data Storage and Access for Archiving and Publication
Table 2: Security Controls according to Data Sensitivity Classification
Section 5 - Definitions
View Document
This is the current version of this document. You can provide feedback on this document to the document author - refer to the Status and Details on the document's navigation bar.
Macquarie University Research Data classification
Macquarie University Cyber Security classification
Examples
General
Public
Published research data
Internal
Unpublished research data not covered by conditions making it more sensitive.
Data considered ‘general intellectual property’.
Anonymised, aggregated or derivative research data relating to individuals. If uncertain, consult a Research Data Steward and/or your Human Research Ethics Committee (HREC).
De-identified research data relating to individuals and not associated with a sensitivity indicator listed at clause 17 a. that cannot plausibly be re-identified from the data itself or in combination with other, publicly available data (if uncertain, consult a Research Data Steward and/or your HREC).
Sensitive
Confidential
Culturally sensitive data.
Environmentally sensitive data.
Data with explicit IP constraints.
De-identified research data relating to individuals and associated with a sensitivity indicator listed at clause 17 a. that cannot plausibly be re-identified from the data itself or in combination with other, publicly available data (if uncertain, consult a Research Data Steward and/or your HREC).
Identifiable research data relating to individuals that does not include data associated with any of the sensitivity indicators listed at clause 17 a.
Data which contains information that is subject to regulatory controls and is deemed sensitive by a Research Management Committee (e.g., Animal Ethics Approval: refer to the Animal Research Act 1985).
Highly sensitive
Highly sensitive
Identifiable research data relating to an individual that includes data associated with any of the sensitivity indicators listed at clause 17 a.
De-identified research data relating to individual that includes data associated with any of the high-sensitivity indicators listed at clause 17 a., which could be re-identified based on the data in the record itself or in combination with other publicly available data.
Data which contains information that is subject to regulatory controls and is deemed highly sensitive by a Research Management Committee (for example if it poses a risk to national security: refer to Defence Trade Controls Act 2012).