INFORMATION SECURITY
Mandatory/key compliance obligations |
When registering a device (with a static IP address) on the campus network:
|
---|---|
Waterloo policy, procedure or guideline |
This policy serves the following purposes:
|
External policy/requirements |
|
Who can help? |
Security Operations Centre (SOC) in Information Systems & Technology (IST): soc@uwaterloo.ca |
Mandatory/key compliance obligations |
Notify IST in the event of a security breach of a device or an information system on the campus network |
Waterloo policy, procedure or guideline |
An Information Security Breach involves one or more of:
|
External policy/requirements |
Depending on the type of data involved, the University may need to notify a third party of the breach. This often has a negative impact on the entire campus network, resulting in the academic activities of the University being impeded. |
Who can help? |
IST SOC: soc@uwaterloo.ca |
Mandatory/key compliance obligations | If your project will involve hosting an event (e.g., workshop, summit) where credit card payments will be accepted, your method of collecting payment must be compliant with the PCI DSS standard |
Waterloo policy, procedure or guideline | Policy 46 - Information Management |
External policy/requirements | |
Who can help? | Associate Director Tax Services, Finance Department |
Mandatory/key compliance obligations | Follow the University of Waterloo’s Acceptable Use Policy |
Waterloo policy, procedure or guideline | Policy 46 - Information Management |
Who can help? | IST SOC: soc@uwaterloo.ca |
Mandatory/key compliance obligations | Projects greater than four years in length must, where possible, budget for possible software and hardware refresh (this may not always be allowed by sponsors) |
Waterloo policy, procedure or guideline | |
External policy/requirements | IST periodically issues directives to prohibit the use of unsupported software platforms. Unsupported software with serious security vulnerabilities present a significant risk without effective security controls to mitigate that risk. In some cases, risk mitigation may not be possible. |
Who can help? | IST SOC: soc@uwaterloo.ca |
Mandatory/key compliance obligations | Data encryption: all research data may need to be encrypted when “at rest” |
External policy/requirements | Varies, depending on the research contract. The contract will stipulate this requirement either directly, or through an Appendix if applicable. |
Who can help? |
IST SOC: soc@uwaterloo.ca |
Mandatory/key compliance obligations | Securely dispose of electronic media, including failed hardware |
Waterloo policy, procedure or guideline | |
External policy/requirements | Depending on the source of the data, there may be requirements for secure destruction. Health data, and data from certain sponsors may have specific requirements (e.g. CIHI, FISMA, FDA). |
Who can help? |
IST SOC: soc@uwaterloo.ca |
Best practices |
Make use of professional systems administrators, if at all possible, to ensure continuity of service |
Who can help? | IST SOC: soc@uwaterloo.ca |
Best practices | Perform regular back-ups of data. Test your backup system periodically by doing a data restore. |
Who can help? | IST SOC: soc@uwaterloo.ca |
Best practices | Apply software updates on a regular basis |
Who can help? | IST SOC: soc@uwaterloo.ca |
INSTITUTIONAL RECORDS MANAGEMENT
Mandatory/key compliance obligations |
Ensure the University records you are responsible for are accurate, complete, and retained in accordance with the University’s retention schedules |
---|---|
Waterloo policy, procedure or guideline | |
External policy/requirements |
Various statutes and regulations, including:
|
Who can help? | University Records Manager |
Mandatory/key compliance obligations |
The most common cases where PIs are responsible for the university’s official records are:
|
Waterloo policy, procedure or guideline |
University records retention schedules: |
Who can help? | University Records Manager |
Mandatory/key compliance obligations | Authorize and document the destruction of university records at the end of the retention period |
Waterloo policy, procedure or guideline | Records Disposal and Destruction |
Who can help? | University Records Manager |
Best practices | Weed out and dispose of transitory records – information of temporary usefulness, such as copies of documents or records of routine tasks – on a regular basis |
Waterloo policy, procedure or guideline | Managing Transitory Records |
Who can help? |
OPEN ACCESS PUBLISHING
Best practices |
|
---|---|
External policy/requirements |
The following principles guide the approach to promoting open access to research publications:
|
Who can help? |
RESEARCH DATA RECORDS MANAGEMENT
Mandatory/key compliance obligations |
Ensure you are in compliance with funder retention requirements |
---|---|
External policy/requirements | See specific funder requirements |
Who can help? |
Library: Writing a data management plan or recommending data repositories |
Mandatory/key compliance obligations |
Ensure you are in compliance with regulatory requirements |
External policy/requirements |
Health Canada Regulated Clinical Trial data must be retained for a minimum of 15 years |
Who can help? | |
Mandatory/key compliance obligations |
Ensure compliance with intellectual property policy |
Waterloo policy, procedure or guideline | Policy 73 |
Who can help? | WatCo – Office of Research |
Mandatory/key compliance obligations |
Ensure your retention plan is aligned with the framework for the responsible conduct of research |
Waterloo policy, procedure or guideline |
If necessary, retain data as long as necessary before and after publication of research results to be able to respond to allegations of research misconduct. Some sponsors or funders may have requirements related to research misconduct (e.g., NIH funded studies require researchers to retain data for six years after the final resolution date of the case) |
External policy/requirements | Tri-Agency Framework: Responsible Conduct of Research |
Who can help? | Need Help page in Research Integrity |
Best practices | Researchers own their data and can retain it for as long as they like, provided it is kept secure |
Who can help? |
IST SOC: soc@uwaterloo.ca |