Request For Pesticide Registry Or Pesticide Application Information - New York State Department Of Health Page 4

ADVERTISEMENT

Project Director (last name, first initial):_____________________________________________________
Work Area Access
• Physical access to the location where confidential data are kept and used
should be limited to researchers and IT staff with proper authorization.
• All confidential material should be locked away at the end of each work shift.
• Any means to be used to move confidential data between researchers should
be described.
• Any forseeable movement of confidential data offsite (e.g., home, other office
locations) should be described.
PC Security
• Study PCs must not be bootable absent the use of set hardware or firmware
passwords.
• Study PCs should be set to boot only from the internal hard disk, not floppy,
CD, DVD, or USB in order to prevent bypassing the operating system logon.
• Data may not be written to removable media or devices except for the purposes
of backup and disaster recovery. If so, the backup/recovery plan should be
described and the media kept secure.
• Users must logoff and shut down whenever they leave the work area.
• Failed hard drives must be kept and destroyed, not returned to the vendor.
• Study PCs must use a secure operating system, requiring a local or network
password to login. Examples of Microsoft products include Windows XP
Professional and Windows 2000 Professional; earlier versions of Windows are
inadequate. Unix, Linux and Apple offer viable operating system alternatives,
but the end user must understand how user IDs and passwords are
implemented on their systems.
• Study PCs must use password protected screen savers.
• Study PCs, particularly laptops, must use encryption software to protect
confidential data at rest.
• Study PC use must be limited to researchers or designated persons, who must
never share passwords or allow others to use their machines
• Study PCs must not host web services, FTP services, or local file sharing.
• Study PCs must maintain up to date virus protection.
• E-mail should not be used to send confidential information.
• Microsoft Word and Microsoft Internet Explorer are particular targets for
hackers. They must be configured properly and appropriate patches installed
to ensure system and data security
4

ADVERTISEMENT

00 votes

Related Articles

Related forms

Related Categories

Parent category: Legal
Go
Page of 8