Security Issues

Help improve this article by adding content. This article is just an outline. Further explanation is needed.

Proverbs 22:3 "The prudent see danger and take refuge, but the simple keep going and pay the penalty."

It is prudent to think about security issues before a problem arises. Here are a number of items field researchers should consider.

The “Prior Question of Trust” (PQT)
For gathering data, establishing trust is a huge issue.
Why should anybody give us information in the first place?
What steps do we need to take to gain trust?
Who owns the information we gather?
Who decides this and how?
What information do you store?
How securely do you store it?
Protocols
For disseminating information, how do you go about establishing data protocols?
What should be included in these?
Who do you include in the decision-making process?
How do we go about getting ownership of these protocols?
Data Security
What data do you give out and what do you restrict to limited usage?
What are legitimate uses of the information and what are not?
How do we determine what to publish on the web versus keep in house?
What is the purpose of our publishing of data, especially on the web?
How do you do all of this in an environment where security is paramount?
File sharing: Google docs, Drop Box, etc.
Computer Security
Theft of computers, telephones and PDAs does happen - so be proactive
Use a password on your computer
Traveling with data—should we encrypt our hard drives? Use encrypted volumes?
How do we protect our e-mail and contact lists on our laptops, cell phones and PDAs?
Memory sticks - easy to loose or be stolen
Back up data regularly
Fact: Hard drives do fail; computers are stolen
Do back ups them regularly, especially before traveling
If you are working with important files (data bases, reports, articles) back them up more frequently to a memory stick or on the cloud.
Keep a back up copy off site to protect against from fire, floods, theft etc.
Consider backups to the cloud - how secure?
Data Management, Security and Encryption
Secure Hard copies of data
Data Encryption on hard drives and on removable media
Consider splitting data bases so that contact information is in a separate file from the survey data.
Traces left on computers
Internet Security
Use up to date antivirus/malware software
Be aware of who might be able to read your screen in public places
Data sent over the Internet - how secure is it?
Big Brother is watching! Governments do stockpile e-mails, internet traffic and telephone conversations for possible investigation
Consider using VPN – Virtual Private Network
How secure is Skype, Go to Meeting, etc.?
Mobile phone security
Use a Password!
Remote wipe and lock security app.
GPS Locater
Autoback up of contacts

Remember: An ounce of prevention is worth a pound of cure. - Benjamin Franklin