Disclaimer: This scenario is not comprehensive of all risks and best practices. This case study represents a certain scenario for general application of research security principles and can be used as a resource for training, exercises and presentation, etc. The names, events and other details of this scenario are created for educational purposes and do not represent any particular event.
Fictional scenario
- Marc is a researcher who is travelling to an international conference abroad where his research will be discussed.
- Marc brought his computer with him and a USB key containing information related to his work.
- During the conference, he gave a presentation during which he connected his USB to a computer provided at the venue. Afterwards, he made contact with several international partners, where he exchanged information and data by connecting his USB to colleagues' devices.
- When Marc returned from the conference, he connected the same USB key to his institution's network.
Risks in this scenario
| Risky practices | Possible consequences |
|---|---|
| Connecting an unsecured data device to an unknown computer or network |
|
| Reconnecting an unsecured data device to the home institution’s network |
|
Risk mitigation
Best practices checklist – Researchers
- DON’T store research data on portable, unsecured devices such as USB thumb drives, flash drives, or portable hard drives. Data stored for use away from the home institution should be limited in scope as much as possible and not pose a risk to an entire research project.
- DON’T re-use physical storage devices or reconnect them to a network after connecting them to a public or unfamiliar computer/network.
- DO develop and apply a data management plan to ensure that only the most pertinent data is stored on disposable mediums such as USB drives.
- DO keep storage devices secure at all times, and don’t connect them to untrusted devices.
Best practices checklist – Post-secondary institutions
- DO encourage researchers to implement a data management plan that includes physical storage mediums such as encrypted USB drives or keep data storage in a secure location such as a locked desk or safe.
- DO encourage researchers to use secure mediums of data storage such as encrypted drives and cloud storage options.
- DO have clearly posted contact information of relevant institutional authorities to reach out to in the event of a breach, or for guidance on these matters in advance of travel.
Additional resources
- Canadian Centre for Cyber Security: Top 10 IT security actions
- Tri-Agency Research Data Management Policy
- CIHR Best Practices for Protecting Privacy in Health Research
- Universities Canada - Travel Security Guide For University Researchers And Staff