Skip to content

Handling Access to Confidential Data

As any info team appreciates, controlling entry to confidential data is a top priority. It’s regarding more than just ensuring that people who are not really entitled to reading or make use of sensitive documents do not get them; it has also encrypting data, requiring two-factor authentication meant for access and regularly examining and promptly revoking usage of sensitive information. It could be about making certain devices and papers will be physically protected and, whenever you can, not kept in shared places or on a single computer mainly because those that contain controlled access data.

All these steps can help minimize the risk of unintentional or malicious disclosure. Yet , it is important to remember that even when your team has thoroughly implemented and enforced reliability protocols, illegal gain access to can still take place. It only takes one salesperson, HEATING AND COOLING technician, neighbors, babysitter, friend of a good friend, police officer or perhaps complete stranger to gain unwarranted entry to your private information.

This is the reason why the ICGC provides this Best Practices record as a guide to secure data handling methods. It is not, however , a substitute for a formal security program devised simply by each financial institution and agreed upon by its institutional putting your signature on officials. The ICGC highly recommends that institutions create and put into action such strategies for their local or cloud configurations just before receiving directed access info from the ICGC. This will help make sure that all parties involved understand the ICGC’s expected values of them, which includes how they should protect the confidentiality of data and specimens in accordance with IRB regulations.


Kalmarweg 14-2
9723 JG Groningen


(050) 5492668



Maandag - vrijdag

09:30 - 17:00


Persoonlijke bescherming



Over ons