Requirements
- Any researcher with access to data or information with a classification rating of
Restricted will have a documented authorization for access to said data. This includes,
but is not limited to, IRB approval and pertinent data governance boards.
- Any researcher with access to data or information with a classification rating of
Restricted must be trained on security and privacy. This includes, but is not limited
to both UTHSC privacy and security training and specific training depending on the
type of information being used in the research.
- Any researcher will not reuse or provide data or information with a classification
rating of Restricted to any unauthorized person or entity.
- Researchers will only request the minimum necessary data to perform the research.
This includes, but is not limited to, a review by IRB and pertinent data governance
boards.
- Researchers will return, or destroy any data or information with a classification
rating of Restricted no longer needed for the research project per IRB guidelines,
or otherwise required under appropriate research agreements.
- Researchers will report (both suspected and confirmed) data breaches immediately per
UTHSC policy, or otherwise required under the pertinent research agreements.
- Data or information with a classification rating of Restricted in either paper or
any electronic and/or digital form stored on laptops, mobile devices, USB drives,
portable storage devices, smartphones, etc. will never be left unattended in unsecure
locations (e.g. cars, unlocked offices) and, when not is use, be stored in a secure
location.
- Any server storing data or information with a classification rating of Restricted
must be housed in a secure data center with controlled access procedures.
- All workstations, laptops, or any other device that store data or information with
a classification rating of Restricted are part of a documented inventory.
- All workstations, laptops, or any other device that store data or information will
be scanned regularly for vulnerabilities.
- All workstations, laptops, or any other device that store data or information will
use the principle of least privilege to perform the research.
- All workstations, laptops, or any other device that store and/or process data or information
will have a modern, active, and supported anti-malware mechanisms installed.
- All workstations that store data or information should have full disk encryption with
FIPS-compliant software.
- All laptops that store data or information will have full disk encryption with FIPS-compliant
software.
- All mobile devices, USB drives, portable storage devices, smartphones, etc. that store
data or information will have FIPS-compliant encryption to protect the data.
- All removeable media including backup media that store data or information will use
FIPS-compliant encryption to protect the data.
- All workstations, laptops, or any other device that store and/or process data or information
will have a modern, current, patched, and supported operating systems (OS).
- All workstations, laptops, or any other device that store and/or process data or information
will have a modern, supported, and patched application software.
- All workstations, laptops, or any other device that store and/or process data or information
should apply security patches to all OS and application software per automated means.
- All workstations, laptops, or any other device that store and/or process data or information
will have a proper and valid software license.
- All workstations, laptops, or any other device that store and/or process data or information
will require authentication using a strong password that minimally meets UTHSC complexity
requirements, and/or have multi-factor authentication in place.
- All workstations, laptops, or any other device that store and/or process data or information
with a classification rating of Restricted will not be public facing and will not
allow for direct access from the Internet.
- Any transfer of data or information with a classification rating of Restricted into
or outside the secure UTHSC network will use FIPS-compliant encryption.
- Any and all storage of data or information with a classification rating of Restrictedon
UTHSC owned portable storage devices will be limited to backup and data version control.
- The use of any and all personally owned workstations, laptops, or any other device that store and/or process data or information with a classification rating of Restricted is not allowed unless with documental approval by the IRB, data governance boards, or data owner.
