Skip to main content

Advertisement

Table 23 Information needed in the event of a security breach.

From: Security and privacy requirements for a multi-institutional cancer research data grid: an interview-based study

Information Needed in the Event of a Security Breach
Investigator
Name(s) of individual(s) responsible
Who funded the project?
Description of the project for which the data was accessed?
Data Accessed
Description of data accessed
Risk level of data
How many patients/participants/subjects were affected?
Were any identifiers present in the data?
Was any data modified – Is the integrity of the data still intact?
Dates of access
What period of time did the data cover?
Incident
Was data re-identified?
Where (physically) did the breach take place?
How many times was the data accessed?
Was the data accessed by more than one individual?
Was data made publicly available (for example on a public website)?
What state did the security breach occur in?
Were SSNs or other financial information released?
Management
What discipline was provided at home institution?
Who was responsible for maintaining security of data?
How was the incident discovered?
Who discovered the incident?
What was the chain of reporting once the incident was discovered?
Was there a failure on the part of the local institution?
What oversight did caBIG governance have over matter?
Was there an unaffiliated investigator agreement in place?
  1. Scenario 3 – Question 17. Respondents included individuals from all organizational roles. Data was aggregated with interview statement as the unit of analysis.