This content is viewable by Everyone

News

Don’t Let the Data Hit the Fan: Your Role in Protecting UCSF Data

Learn about your role in protecting UCSF data and pass the quiz at the end of the article. You could win one of six $50 Amazon gift cards!

At UCSF, institutional information - data- has become the beating heart of our institution and is vital to everything we do. As the volume and complexity of data grow rapidly and regulatory demands tighten, effective data management has never been more crucial. Everyone at UCSF has a role to play in protecting our data. UCSF 650-16 Addendum A - UCSF Roles and Responsibilities for Securing Institutional Information and IT Resources describes these roles and key responsibilities. 

All UCSF employees are considered “workforce members” and must adhere to UC Policy BFB-IS-3: Electronic Information Security,  UCSF Policy 650-16: Information Security and Confidentiality, and, if UCSF Medical Center Systems are involved, Policy 5.01.06 Control of Access to and Release of Information from UCSF Medical Center Information Systems.  

Additional information to help you understand your responsibilities is available in the UCOP Quick Start Guide by Role.

Data Security Lifecycle

 

""

Proper oversight of data throughout its life cycle is critical to optimize its utility and minimize potential errors and breaches. Below are examples of the measures that must be taken within each of the four phases pictured above.

Plan and Create

Additionally, if Medical Center data is involved, Policy 5.01.06 Control of Access to and Release of Information from UCSF Medical Center Information Systems must also be followed.

 Store

Use and Share, Including Transmitting Data Electronically

  1. PHI:
  2. ePHI:
  3. Secure:
  4. [encrypt]
  • Obtain consent to share data:   The Institutional Review Board’s approval is needed for human subjects research.
  • If sharing de-identified health information, ensure it is adequately de-identified: The current sources of certified de-identified research health information at UCSF are the De-identified Clinical Data Warehouse and Information Commons. Obtaining data through the Clinical Data Research Consulting (CDRC) research data extraction service ensures that the resulting dataset will be correctly de-identified.
  • Follow the minimum necessary standard: For example, at UCSF, we must limit the use and disclosure of patient information to the minimum necessary to complete the task. Doing so helps to protect patient privacy and reduces the risk of privacy incidents.
  • Publish and copyright information properly: The UCSF library provides guidance on copyright, publishing, and intellectual property.

Destroy

  • Retain the data for the correct amount of time: Data should be stored in accordance with the UC Records Retention Schedule.
  • Destroy unneeded paper documents that might include protected information:  Secure disposal bins should be used. Your manager can order one from approved vendors in BearBuy.
  • Destroy electronic media that may contain protected information: Contact the IT Service Desk or call 415-514-4100. IT will collect and arrange for the destruction of any electronic media (hard drives, tapes, etc.) that contains restricted or sensitive data, including PII (personally identifiable information) and PHI (protected health information), free of charge.
  • Ensure data maintained by third parties is appropriately managed at the end of projects: Per the Appendix Data Security (DS), at the end of a project, the supplier must return all Institutional Information to the University of California (UC) within thirty (30) calendar days of the termination, cancellation, expiration, or other conclusion of the Agreement. After returning the data, the supplier must dispose of the Institutional Information in its possession, as well as any data held by sub-suppliers or agents, using methods described in UC’s Institutional Information Disposal Standard or an alternative approved by UC 

Take the quiz on protecting your data. Everyone who passes the quiz is entered to win one of six $50 Amazon Gift Cards.

Additional Information: