All,

Our next Reading Group meeting will take place on WEDNESDAY of next week --
May 7th -- from noon to 1pm in 200C Warren Hall.

We'll be discussing management of sensitive or restricted research data,
with a particular focus on federal guidelines and rules: issues that are
critically important to researchers across a wide range of domains because
those guidelines and rules ground the model for auditing research grants
that manage or use sensitive data.

University practice in this area is largely driven by institutions that
include medical schools, and therefore broad and deep need to manage
personal health information in a secure way in alignment to HIPAA
guidelines (see optional reading). That said, more and more sensitive data
outside med school domains needs the same kind of management.


This was a topic of special discussion at the April CASC meeting in
Arlington, VA, attended by Patrick Schmitz who will facilitate next week's
discussion.


Please read the following to prepare for our discussion next Wednesday
(note specific page or section callouts for the large NIST document):



==> Overview of Federal   Information Security Management Act (FISMA):

    http://csrc.nist.gov/groups/SMA/fisma/ and


http://en.wikipedia.org/wiki/Federal_Information_Security_Management_Act_of_2002




==> FISMA generally points at NIST for the details:


http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf

    [Page references below are PDF pages, not the numbering of pages in the
document sections themselves...]

    o PDF pages 8-12

    o Chapter 1, Introduction (PDF pages 23-27),

    o Chapter 2 through the end of Section 2.1 (PDF pages 29-31)

    o Glance at Appendix D for the way they think about the guidelines (PDF
page 107-149)



Federal Risk and Authorization Management Program (FedRAMP) is another
model.

See
http://www.datacenterknowledge.com/archives/2013/11/26/government-clouds-what-is-a-fedramp/
for
a discussion of fedRAMP certification. Browse
http://www.gsa.gov/portal/category/102375 andhttp://cloud.cio.gov/fedramp  if
you want.



Optional:

=========


HIPAA: Read the intro to
http://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act,
but ignore all the bits about insurance, etc.


Scan
http://www.businesswire.com/news/home/20110707006289/en/University-California-Settles-HIPAA-Privacy-Security-Case#.U2A7M_ldV8E
for
impact on Med Centers.



A commercial approach: HITRUST:
http://hitrustalliance.net/common-security-framework/understanding-leveraging-csf/




We're looking forward to seeing you on Weds 7 May at noon, 200C Warren Hall.


~Steve





-- 
Steve Masover
IST Research Information Technologies
maso...@berkeley.edu
510-642-8488

Reply via email to