information security decision- making tool what kind of data do i have and how do i protect it...
TRANSCRIPT
![Page 1: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/1.jpg)
Information Security decision making tool 1
Information Security Decision-Making Tool
What kind of data do I have and how do I protect it appropriately?
Continue
![Page 2: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/2.jpg)
Information Security decision making tool 2
Choose the menu option which best describes how you are working with LSE Information. You may use this several times for
different aspects of your work
HR or other confidential records Financial records
Other types of work with LSE information
Research Exam information
![Page 3: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/3.jpg)
Information Security decision making tool 3
Do you keep HR records on other people or yourself?
Including our own career development review or documents
No Yes
![Page 4: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/4.jpg)
Information Security decision making tool 4
Continue
This information is confidential
Continue to find out more…
![Page 5: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/5.jpg)
Information Security decision making tool 5
Do you keep sensitive information on individuals?
Excluding contact details for colleagues that is freely given
No Yes
![Page 6: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/6.jpg)
Information Security decision making tool 6
Do you keep sensitive information on exams?
Including papers, results, discussions about questions or candidates
No Yes
![Page 7: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/7.jpg)
Information Security decision making tool 7
Do you keep financial records?Excluding published company accounts that are in the
public domain
No Yes
![Page 8: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/8.jpg)
Information Security decision making tool 8
Is the information held on paper?
No Yes
![Page 9: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/9.jpg)
Information Security decision making tool 9
Continue
Keep it in a lockable cabinet
Continue to find out more…
![Page 10: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/10.jpg)
Information Security decision making tool 10
Do you protect electronic information with MS Office
passwords?
No Yes
![Page 11: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/11.jpg)
Information Security decision making tool 11
Continue
Your information is not secure enough
with this alone.
Continue to find out more…
![Page 12: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/12.jpg)
Information Security decision making tool 12
Do you keep it on H space or a shared drive with appropriate
folder permissions?
No YesDon’t Know
![Page 13: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/13.jpg)
Information Security decision making tool 13
Continue
GoodClick here for more information
Continue to finish this session or Home to go back to the beginning
![Page 14: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/14.jpg)
Information Security decision making tool 14
Do you protect it with file encryption?
No Yes
![Page 15: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/15.jpg)
Information Security decision making tool 15
Continue
Good
Click here for more information
Continue to finish this session or Home to go back to the beginning
![Page 16: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/16.jpg)
Information Security decision making tool 16
Where do you keep the electronic data and reports you work on?
No Yes On H space or a shared drive or SharePoint only?
![Page 17: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/17.jpg)
Information Security decision making tool 17
Where do you keep the electronic data and reports you work on?
On Local drive, Laptop, tablet, smart phone or other device? YesNo
![Page 18: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/18.jpg)
Information Security decision making tool 18
Continue
Using these drives should keep your information secure but check
folder and file permissions to make sure the ‘need to know’
principle is applied.
Click here for more information
Information on shared drives is backed-up at least once a day.
Continue to find out more…
![Page 19: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/19.jpg)
Information Security decision making tool 19
Your information is at risk. If you can share it with your team put it on a shared drive to keep it secure and
check folder and file permissions to make sure the ‘need to know’ principle
is applied. Click here for more information
If your info cannot be shared email IMT for advice now
Continue to finish this session or Home to go back to the beginning
Continue
![Page 20: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/20.jpg)
Information Security decision making tool 20
Do you use a database or spreadsheet to record
information?
No Yes
![Page 21: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/21.jpg)
Information Security decision making tool 21
Do you ever work away from your desk?
No Yes
![Page 22: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/22.jpg)
Information Security decision making tool 22
Where do you keep the files you access remotely?
No YesOn H space or shared drive or SharePoint only?
![Page 23: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/23.jpg)
Information Security decision making tool 23
Continue
Using these drives should keep your information secure but
check folder and file permissions to make sure the ‘need to know’
principle is applied.
Click here for more information
Information on shared drives is backed-up at least once a day.
Continue to find out more…
![Page 24: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/24.jpg)
Information Security decision making tool 24
Where do you keep the files you access remotely?
Dropbox, Google Docs, One Drive or other cloud based storage?
YesNo
![Page 25: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/25.jpg)
Information Security decision making tool 25
Where do you keep the files you access remotely?
Memory stick, CD, DVD, Floppy disk or other storage media?
YesNo
![Page 26: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/26.jpg)
Information Security decision making tool 26
Continue
Your information could be at risk.
Click here for more information
If you can share it with your team put it on a shared drive to keep it
secure. If your info cannot be shared,
email IMT for advice now.
Continue to find out more…
![Page 27: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/27.jpg)
Information Security decision making tool 27
Continue
Your information could be at risk. Click here for more information
If you can share it with your team put it on a shared drive to keep it
secure. If your info cannot be shared,
email IMT for advice now.
Continue to finish this session or Home to go back to the beginning
![Page 28: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/28.jpg)
Information Security decision making tool 28
Is your data sensitive or confidential?
No Yes
![Page 29: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/29.jpg)
Information Security decision making tool 29
Have you signed a funding contract?
No Yes
![Page 30: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/30.jpg)
Information Security decision making tool 30
Is the LSE the project lead?
No Yes
![Page 31: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/31.jpg)
Information Security decision making tool 31
Continue
Follow the project lead’s guidelines on securing information.
Click Finish
If you need advice to comply with guidelines, email IMT or the Data Librarian. Click Finish
If no guidelines are available Continue to find out more…
Finish
![Page 32: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/32.jpg)
Information Security decision making tool 32
Does your research contract specify information security requirements?
No Yes
![Page 33: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/33.jpg)
Information Security decision making tool 33
Can you meet the security requirements?
No YesDon’t Know
![Page 34: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/34.jpg)
Information Security decision making tool 34
Continue
Comply with the contract.
Continue to find out more…
![Page 35: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/35.jpg)
Information Security decision making tool 35
Continue
Email IMT or the Data Librarian
for advice.
Continue to finish this session or Home to go back to the
beginning
![Page 36: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/36.jpg)
Information Security decision making tool 36
Do/will you keep sensitive personal data?
Examples: racial/ethnic origin, political opinion, religious beliefs, trade union membership, physical/mental health
condition, sexual life, criminal records
No Yes
![Page 37: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/37.jpg)
Information Security decision making tool 37
Do/will you keep personal financial data/reports on financially sensitive
subjectsExamples: bank and salary details
No Yes
![Page 38: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/38.jpg)
Information Security decision making tool 38
Do you keep sensitive information on individuals?
Examples: interview transcripts, databases of individual information
No Yes
![Page 39: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/39.jpg)
Information Security decision making tool 39
Do you need to share data with academic partners?
No Yes
![Page 40: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/40.jpg)
Information Security decision making tool 40
Do you use SharePoint?
No Yes
![Page 41: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/41.jpg)
Information Security decision making tool 41
Have you or the site owner received SharePoint training?
No Yes
![Page 42: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/42.jpg)
Information Security decision making tool 42
Continue
Check that the permissions on your site are accurate and that
all data is appropriate
For more information click here
Continue to find out more…
![Page 43: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/43.jpg)
Information Security decision making tool 43
Continue
Contact IMT now for appropriate training
options
Continue to find out more…
![Page 44: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/44.jpg)
Information Security decision making tool 44
Continue
Email IMT for advice now.
Continue to find out more…
![Page 45: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/45.jpg)
Information Security decision making tool 45
Are you in the end-of-project phase?
No Yes
![Page 46: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/46.jpg)
Information Security decision making tool 46
Continue
Email theData Librarian
for advice.
Continue to find out more…
![Page 47: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/47.jpg)
Information Security decision making tool 47
Is the information held on paper?
No Yes
![Page 48: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/48.jpg)
Information Security decision making tool 48
Continue
Keep it in a lockable cabinet.
Continue to find out more…
![Page 49: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/49.jpg)
Information Security decision making tool 49
Thank you for completing the Information Security decision-making tool.
Email IMT if you have any further queries or concerns or if there is anything else you think we should include in this tool.
Finish
![Page 50: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/50.jpg)
Information Security decision making tool 50
Continue
Access control systems are in place to protect the interests of all authorised users of LSE IT systems by providing a safe, secure and accessible environment in which to work.
Access rights will be accorded following the principles of least privilege and need to know.
Access to LSE IT resources and services will be given through the provision of a unique user account and complex password.
For further reading, click this link.
http://www.lse.ac.uk/intranet/LSEServices/policies/pdfs/school/accConPol.pdf
![Page 51: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/51.jpg)
Information Security decision making tool 51
Continue
Encryption is a way of encoding information so that it cannot be read without the appropriate key to decode it. It is a way of rendering files, volumes or hard disks extremely secure.
Encryption should be used to secure data that are in transit or else are accessed and held outside LSE systems, for instance on a home workstation, or on devices that are easy to steal or lose (suchas laptops, tablets etc).
http://www.lse.ac.uk/intranet/LSEServices/IMT/about/policies/documents/Guidelines-Encryption-Guidelines-v1-1.pdf
![Page 52: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/52.jpg)
Information Security decision making tool 52
Continue
Cloud storage is effectively disk space made available by third parties over the internet but are not supported at the LSE. There are many providers of this type of storage but we are going to focus here on Dropbox as an example.
We would advise against putting anything into Dropbox that would contain very sensitive information, such as School financial data or datasets that contained the name, address, ethnicity and passport numbers of individuals. This includes information the School classifies as ‘Secret’. Data classed as ‘Secret’ or ‘Confidential’ should be carefully assessed by the owner for the risk of reputational and financial damage if it leaked before putting it in Dropbox.
For further reading please click this link.
http://www.lse.ac.uk/intranet/LSEServices/IMT/guides/softwareGuides/other/usingDropboxCloudStorageServices.aspx
![Page 53: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/53.jpg)
Information Security decision making tool 53
Continue
USB or similar storage devices are easily lost or stolen, putting any data they contain at great risk of being accidentally or deliberately exposed. The loss of confidential or sensitive personal data on a USB storage device could result in LSE:
• being fined by the Information Commissioner's Office• suffering reputational damage• causing distress to those whose data has been lost• losing valuable research contracts
For further reading please click the link below
http://www.lse.ac.uk/intranet/LSEServices/IMT/about/policies/usingUsbStorageDevices.aspx
![Page 54: Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making](https://reader037.vdocuments.mx/reader037/viewer/2022103005/56649de45503460f94adbba7/html5/thumbnails/54.jpg)
Information Security decision making tool 54
Continue
Email IMT for advice now
Continue to finish or press Home to go back to the beginning.