ITAG Lunchtime Seminar: Sensitive Data and Local Databases

Download Report

Transcript ITAG Lunchtime Seminar: Sensitive Data and Local Databases

ITAG Lunchtime Seminar
Filemaker
Best Practices and Service
Offerings
Scott Thorne, IS&T ISDA
“Sensitive Data and Local Databases”
MacKenzie Smith, Libraries
“MIT Libraries Policy on the Use of Filemaker for
Applications”
Jeff Reed, Cecilia Marra, IS&T DCAD
“Filemaker Service Offerings”
ITAG Lunchtime Seminar Series
February 7, 2007
http://web.mit.edu/itag
Sensitive Data and
Local Databases
Feb 7th 2007
Scott Thorne
Background

There is growing need to build small
systems to meet departmental business
needs

There is a growing problem of data spills


TJX etc
Creates potential risk for the Institute
Response

Promote Awareness

Provide Recommendations


Technical

Business
Provide Resources
Use local database technology such as
Filemaker for -
Local Applications only

That meet the following criteria:

Relatively small & simple

50 users

20 tables or files

100 fields

No Sensitive Data

Use the recommended version and configuration

Manage data not needed by other systems

Warehouse
Sensitive Data

More work required to classify data and gain consensus on
procedures

Extremely Sensitive


Disclosure causes harm

Financial or otherwise

Organizations or Individuals

Example: SSN
Collected with the promise of confidential treatment


Sensitive

Choose to keep confidential, but does not cause harm


Example: Faculty Survey Information
Example: Salaries
http://istwiki.mit.edu/istwiki/ItagSensitiveData or more recently
https://confab.mit.edu/confluence/display/ITAG/ItagSensitiveData
Implementation

Use FileMaker Server instead of peer-to-peer

Use Strong Passwords

Require a password for FileMaker Server

Turn on SSL

Hide Files from network scanning (port 5003)

Implement a backup and recovery procedure

Physically secure the server and backup media
Data Common Sense

Don't store data unless you know why

Don't collect data that is already collected at MIT

Don't collect data until it's needed

Don't store data unless there is a plan to maintain it

Decide data retention policies before collecting data

Review data models before building a system

Document the data definition and sensitivity before
collection

Only update data in its System of Record
More Resources

http://web.mit.edu/itag/policies/sensitive-data.pdf

http://web.mit.edu/itag/guidelines/data.html

http://web.mit.edu/ist/help/filemaker/fmug/Top10.pdf