Attachment 7 - Data Security Plan

Attachment 7 - Data Security Plan.pdf

Bureau of Primary Health Care Patient Survey

Attachment 7 - Data Security Plan

OMB: 0915-0326

Document [pdf]
Download: pdf | pdf
2. Data Security Plan
2.1.

Overview

This document outlines RTI’s plans for protecting the security and privacy of data collected
as part of the PHCPS. All of the information collected will be private; some of the information is
or may be considered sensitive. The sensitive information will include:
■
■
■

Household income and receipt of benefits
Dates of birth
Substance use, mental health status and perceived need for services and utilization of
services
■ HIV/AIDS infection status and testing status
This information will be collected as part of a field survey using laptops that are passwordprotected and fully encrypted. If a laptop is lost or stolen, the risk of data exposure is very small.
In addition, as part of routine survey administration, field interviewers will carry paper forms
for recording respondent consent, receipt of incentives, and the actions which took place with
each case including the current case status (via a contact summary report form). The contact
summary report form will only be used to record respondent contact information if he/she is
eligible and interested but unable to complete the interview while at the site. The use and
handling of paper signed consent forms will be among the issues discussed with the Internal
Review Board prior to data collection. Paper documents other than the consent form and the
contact summary report form will not identify the study name nor content so that a respondent’s
personal information cannot be linked to study participation. The contact summary report form
will contain case specific information along with the following:
■
■
■

Date and time of contact attempt
Outcome code (e.g., refusal, language barrier)
Notes (e.g., respondent reluctant)

The use of paper forms carries a greater risk of data loss because the forms are more easily
lost and publicly accessible compared with laptops. For this reason, we have limited the
information collected on paper forms to that which is absolutely necessary. Recording the results
of contact attempts on paper forms facilitates its accuracy and accessibility.
We have designed the data collection protocol to minimize the amount of sensitive and
identifying information that is stored on paper forms. Moreover, we have specified physical
safeguarding and shipping procedures, and protocols for training interviewers in the use of these
procedures. These procedures are described in the remainder of this document, along with our
procedures for network security, data processing and management systems, electronic data
storage, and data transfer.

2.2.

Network Security

RTI has implemented an Information Security program based on the Defense in Depth
concept. This strategy combines the capabilities of people, operations, and technology. The first
layer of protection is RTI's Internet firewall, which connects RTI to the Internet. All traffic
between the RTI network and the Internet passes through this single connection point, providing a
high level of protection and monitoring to all systems within the RTI network.
The firewall is programmed with a set of rules to determine if network access is in
compliance with RTI's network security policy and then allows or prevents access to the RTI

C-1

network. The firewall logs all incoming traffic from the Internet to the RTI network. This
information is essential in detecting and analyzing any problems.
The firewall is used to create two RTI network domains with different levels of accessibility
from the Internet. These domains are often called the "private network" and the "public network,"
although the public network is not actually open to the public. The private network is the main
RTI network, and most systems are located on it. Access to this network from the Internet is very
restricted, using a limited set of protocols into specific systems. For example, incoming electronic
mail is only permitted to specific mail servers. The public network is configured to provide
services that require access from the Internet such as web servers. Servers on the public network
must be registered with RTI’s Information Technology Services department (ITS) and must
specify which services they run. This enables the firewall rules to allow only those requests for a
particular service to pass through the firewall. By not allowing unnecessary services through the
firewall, the overall security of the public network is greatly improved.
Web servers are placed behind load balancing devices, which are configured to deny all
traffic not specifically allowed according to their configuration. This serves as a layer of
protection between the network connecting the web servers and the public network. Only
approved file types are allowed on the web servers. For example, CGI scripts are not permitted on
web servers. The load balancing devices also perform Network Address Translation (NAT)
providing another layer of protection to the web server.
Computer-based tools are used to detect and identify vulnerabilities on RTI systems. This
ensures that vulnerabilities, if detected, can be corrected before unauthorized persons exploit
them. Multiple layers of automated network and server monitoring quickly identify failures or
unusual activity levels, which may be an indication of an attempted security breach. Alerts may
be sent 24 hours a day, 7 days a week via e-mail and pager to on-call staff for evaluation and
resolution.
System and network administrators are automatically subscribed to multiple mailing lists to
ensure they are quickly informed of security advisories. These include CERT, Microsoft,
Network Associates, Trend Micro, Red Hat, and SANS. RTI is an active member in InfraGard, a
cooperative security program between the FBI and commercial enterprises.
A multilayered anti-virus program is in place. All e-mail is scanned entering and leaving
RTI’s network. Anti-spam filters are in place. An additional layer of protection takes place at
individual workstations, each of which runs anti-virus software with automatic updates.
Security awareness articles are posted on the internal RTI website several times a year to
ensure that staff remain aware and vigilant about following appropriate security precautions, and
specific alerts are issued when imminent threats are anticipated.
IT Security staff maintain certifications including:
■
■

2.3.

Certified Information Systems Security Professional (CISSP)
Firewall vendor certifications for administrators and engineers

Data Processing and Management Systems

RTI will take appropriate precautions at all stages of data storage and handling to prevent
disclosure, damage or loss of study data. The major components of the data processing and
management systems are:
■
■

Control System – interface and database for use by RTI staff on the internal intranet to
manage documents, case status and contact information.
Integrated Field Management System (IFMS) – web site and databases for use by field
supervisors and RTI survey managers to assign and track cases in the field. Includes
processes to receive incoming data and move it to the internal network.

C-2

■

Blaise instrument – developed on the internal network and executed on field laptops to
collect survey response data.
■ Master response database – located on the internal network accessible only by RTI
project staff, storing the collected response data from all completed interviews.
■ Utilities, reports and data analysis applications – run nightly or on-demand to produce
reports for the field supervisors and RTI survey managers.
See Figure 1 below for an overview of how all of these systems tie together to produce an
integrated and comprehensive data management system for the project.
In general, data will be maintained on internal network shares or databases as needed until the
close of the contract. Access to the internal network is only available to RTI employees, and
access to project-specific shares is limited to team members for this project. The ability to update,
delete or change the data file storage area will be restricted to network domain managers and to
staff approved by the project director. As a result, direct access to data is very limited. Most users
can only access data through the secure data processing and management systems.
For privacy and security, RTI data processing and management systems utilize:
■

Unique identification numbers for cases, used in reports instead of recognizable personal
information
■ Data storage on RTI’s internal, firewall-protected network
■ Restricted access to network data through Windows authentication and share access lists
■ Interviewer authentication in data collection systems and encrypted hard drives on
laptops
■ Encrypted file transmission through Secure FTP and Secure Socket Layer (SSL)
encryption for the field management website
■ Nightly data backup with offsite storage for 3 months
■ Up-to-date virus protection on all internal and external servers, workstations and laptops
■ Password protection and role-based authorization on web sites, case management and
control systems
Authorized project staff with access to stored data can only do so from workstations which
meet RTI’s security standard. Each is protected from virus attack by regularly-updated anti-virus
software. Data files are not stored on workstation hard drives, except as transient files during an
active process. They are deleted as soon as the activity is completed. Workstations are locked and
password-protected when unattended, and are located within key-card access buildings. Remote
access is allowed through use of RTI-approved virtual private networking software for approved
staff only.

C-3

Figure 1. Data Systems

BPHC Patient Surveys Data
Management System
SQL

3

Case Mgmt

Web Server

SQL

Firewall Layer 2

Field
Supervisors

Firewall Layer 1

SQL

Survey Management &
Programming staff

Transmission

1

Control
System

2
4

Field Laptop,
Interviewers
Blaise Master DB
SAS Datasets
Application Pgms

FTP Sites
Transmitted Files

1. Field interviewing and transmission
2. Case file release , capture and tracking
3. Interview status tracking
4. Programming and data management

2.4.

Data Storage

All electronic data are securely stored on either file servers or SQL database servers within
RTI’s secure intranet, as shown in Figure 1 and as described in the section on network security.
Access to these servers will require login authentication and be limited to staff on the project with
a need to know. The project maintains three categories of data:
■
■

Response data from interviewing
Tracking and control data for managing systems and schedules

Of these, the response data require the highest level of security. Tracking and control data
typically do not contain sensitive information, being linked to respondents only through internally
assigned identification numbers.
Response data, once received from the field, is maintained in a Blaise master database
residing on a secure file server. Access to this data is limited to in-house project staff and
controlled by Windows authentication and security group. The process of transferring response
data from field laptops to RTI is described in the next section, Data Transfer. Tracking and
control data are maintained in a SQL Server database. Again, this information is only available to
in-house project staff with access to the Control System.
The data stored in the IFMS system are primarily for field management operations and data
transmission between field laptops and the data processing and management systems. Examples
of field management related data are case assignment, production monitoring, and expense
reports. Transmission data may include assigned cases, complete cases, case status, and

C-4

transmission status. The IFMS data will be stored in a SQL Server database protected by SQL
Server security and the more general network security enforced by access permissions and
firewall protection. The database itself resides on a server in the “public network” described in
the Network Security section.
The IFMS database will be used by the field supervisors, the project survey specialist, and the
data collection task leader. Access to this database is via a secure web site. The web site has a
current SSL certificate and requires a user- and project-specific username and password which
filters the display of information on screen according to the role assigned to each user. For
example, survey staff accessing the IFMS will see more information and options than the field
supervisors. Very limited information is available to the field supervisors, largely consisting of
tracking information and summary reports.
SQL Server databases and file servers which are involved in transmissions to and from the
field reside in the “public network” behind RTI’s firewall but with necessarily fewer restrictions
than the internal network. They are programmatically accessible to field staff but not to the
general public. The SQL databases contain tracking information identified by internally assigned
case IDs, and they do not contain respondent contact or response data. Access to the databases is
limited to authorized project staff and system administrators. Other transient data, including case
data for field interviewers or response data files sent back to RTI, pass through the secure FTP
server temporarily via a SSL connection. Only project-authorized system administrators and
programmers have direct access to the FTP file storage site.
Laptops used by field supervisors and interviewers receive contact data and return response
data, and thus the highest level of security must be applied to the hardware and processes. All
field laptops run Windows XP with login/password protection. In addition, the hard drives of all
laptops are encrypted at shutdown and cannot be accessed by anyone who should happen to steal
or otherwise obtain access to a project laptop. On startup, only the correct login will allow
decryption of the laptop contents.
Data files and information stored on servers will be protected and maintained as long as the
project needs access. Following the termination of the project, or following the end of the useful
life of the information, files will be compressed, encrypted and archived to permanent media such
as compact disk (CD) or digital video disk (DVD) for storage. CD and DVD archives will be
maintained and stored in locked filing cabinets in the offices of project staff as long as needed,
with destruction at the end of the study at the request of BPHC.

2.5.

Data Transfer

There are several processes which will move study data within and outside RTI. These
processes are shown with numbered arrows in Figure 1.
■
■
■

Creation and transmission of preload data files for interviewing (processes 1 and 2)
Transmission of response data files from the field to RTI (processes 1 and 2)
Sample loading, data management processes, reporting, and other internal operations
(processes 3 and 4 )

At each stage of information transfer, precautions are taken to ensure data safety and privacy.
Only approved survey staff can access the file servers and databases, through login/password
controlled applications and Windows authentication.
Data transfer within RTI’s secure intranet takes place under Windows authentication and
access control lists, providing access only to staff specifically authorized for this project and to
network administrators. Please see Section 2 for details of internal network security.
In these ways, RTI will ensure the safety and privacy of data while it is stored and while it is
in transit among the project team and members of the field staff.

C-5

2.6.

Security of Electronic Data in the Field

Interviewer laptops will contain case ids that link to other case management information such
as the respondent’s name, address, future contact information, and interview data. In addition to
the protocols described above, security measures are in place for protecting electronic data in the
field:
■
■

■
■
■
■

2.7.

Laptops are strongly encrypted and password protected.
Interviewers must transmit data to RTI every day that they work and at least three times a
week. Interview data must be sent to RTI on the day it is collected. Once received at RTI
and backed up, interview data will be deleted from the laptop. Supervisors will monitor
interviewer adherence to the protocol using daily transmission reports.
In the event a laptop is lost or stolen, only active cases and those awaiting deletion are on
the laptop. With the laptop security procedures including encryption as described in
previous sections, the risk of these cases being exposed is very small.
Passwords must not be written down or shared with anyone.
When with a respondent, interviewers take care that the respondent cannot see the case
management display on the computer, which may list other cases.
All email communication by field staff must take place using computer accounts
established for the PHCPS (i.e., no use of personal e-mail accounts is allowed).

Safeguarding Physical Materials in the Field

Field staff will be trained on the importance of maintaining privacy of all study materials
containing case-specific information, including the laptop computers themselves. Specific
procedures designed to ensure that physical security of these items is not compromised include
the following:
■
■

2.8.

When in the field, case materials must be kept with the interviewer or kept out of sight in
a locked vehicle. However, materials may not be left in a vehicle overnight. No materials
may be left visible in an unoccupied vehicle.
When traveling, confidential materials must be carried on board the aircraft, not checked
through baggage. In hotel rooms, materials must be kept locked and out of sight when not
in use.

Shipping Materials

To prevent opportunities for data loss after an interview is completed, field staff will be held
accountable for adhering to the specified procedure for shipping materials to RTI:
■

■

■
■

Completed consent forms, incentive receipts, contact summary report forms are shipped
to field supervisors weekly. The field supervisors perform a quality control check of all
materials, and then ship the materials to RTI. After a period of observation confirming
adherence to procedures, field interviewers may ship completed materials directly to RTI
per their Field Supervisor’s direction.
Field staff prepare a transmittal sheet and place it in the Federal Express package. The
transmittal sheet contains the air bill number, name of the person who will receive the
package, date the package is sent, and the case identification numbers of the case folders.
Interviewers keep a copy of the transmittal sheet. If a package is lost, an inventory of
missing items is readily available.
Traveling field staff are not allowed to FedEx case materials from or to hotel addresses.
Instead, they are expected to carry all case materials with them in their carry-on luggage
or drop materials off at a manned FedEx station before traveling home.
Field staff are instructed to send Federal Express tracking information via e-mail to their
field supervisors each time they ship study materials to RTI. This e-mail must include a
C-6

■

2.9.

list of the items in the Federal Express package, the shipment date, the expected delivery
date, the delivery address, and the tracking number. No respondent personally identifying
information is included in these e-mails.
Shipments among staff (e.g., materials associated with a transferred case) must be
documented in e-mail between the two interviewers involved and their supervisor(s). If
the package does not arrive on the date expected, it will be tracked immediately.
Packages cannot include the name or acronym of the study anywhere on the package or
on the shipping bill.

Storage of Documents

Paper forms will be received, logged, and stored at RTI’s Fulfillment Department. This
controlled-access department resides inside a secured facility located a short distance from RTI’s
main campus.
■
■
■

2.10.

A small team will be assigned to the project and trained on procedures for receipt and
storage of materials. These staff (along with all project staff) will sign the project’s Data
Privacy Agreement.
All paper forms will be logged into the project’s Control System. This system will
contain the case identification number and the status code of each case as well as contact
information.
Documents will be stored in locked filing cabinets.

Field Staff Training

Comprehensive training on all data privacy and security protocols will be provided to
interviewing staff, as follows:
■

■

■

■

2.11.

The Field Interviewer Manual will contain detailed information on all data privacy and
security protocols, including requirements for safeguarding information, data
transmissions, and shipment of materials. The field interviewer manual also includes a
description of disciplinary procedures for failure to follow project protocols, including
those related to data privacy and security.
The field interviewer home study will include multiple items related to data privacy and
security. The home study will be completed by all field staff prior to attending training;
home studies will be graded and field interviewers will be required to correct items they
miss.
The field interviewer training program will include comprehensive modules on data
privacy and security. A certification station will involve completion of a certification
exam on the key data privacy and security protocols for the survey. Field interviewers
must be certified before they can begin work.
The field supervisor training program will include comprehensive modules on data
privacy and security, including compliance monitoring.

Information Provided to Respondents about Privacy

Within the informed consent document and in other verbal discussions of privacy,
respondents are informed that their participation and the information they provide will be kept
private. In addition, they are told that everyone involved in the study has signed an agreement
stating they will protect the privacy of the information provided and the information provided will
not be shared with anyone at the health care center.

C-7


File Typeapplication/pdf
File TitleMicrosoft Word - Data Security Plan.doc
Authoracash
File Modified2009-03-03
File Created2009-03-03

© 2024 OMB.report | Privacy Policy