Norwegian
version of this page
My responsibility as a researcher
Information security for researchers.
Terms you should know
IT systems and other equipment
You must
- know what IT systems are being used in your research
- know who operates these systems
- always keep the system updated
- make sure that the system is registered at USIT or via the registration application (Norwegian). Most IT systems used in research process personal data and should be registered.
- be extra aware when technical equipment is accompanied by computer equipment or their own web solutions
- know what administrative and technical requirements USIT demands of IT systems, computers and users. Read more about this in LSIS (Norwegian).
- include local IT and USIT when phasing in and out new and old IT systems
- involve local IT and USIT in the operating of the IT systems
- be sure that the IT systems are integrated in the correct way with the rest of UiO's IT systems
- report IT systems with special needs for expentions to USIT
- take care that old systems are phased out or given special attention, eg. incorporated into the labnet service
- have regularly scheduled run throughs of the systems to discover what changes have been made in other related systems that may give new opportunities or challenges
Storage
You must
- familiarize yourself with the part of LSIS that is about classification of information
- know where you can store different types of research
- make sure that your team has approved shared disks (Norwegian) for sharing data. local IT can help you with this.
- make sure that local IT is familiar with your research, including what data is being processed and who you are cooperating with
- make sure that data exchanged with other environments is exchanged safely and correctly
- make sure that data with protection needs (yellow, red or black data) does not end up without encryption on loose hard disks or USB units
- make sure that you and your team does not store black data outside of the services made for this kind of data. This means largely TSD.
- be extra attentive when data is transferred to laptops
Access control
You must
- ensure that access to the systems in question is assigned and revoked with the help of good, written routines which are regularly revised
- ensure that local IT is involved in access control and is familiar with what mechanisms used. This includes for example Cerebrum groups.
- ensure that regular users does not operate the systems
- ensure that people from other environments, who are using the systems, has access the right way, for example via WebLogin, UHAD or Feide.
- ensure that the systems do not have local or impersonal users unless there is a special reason for it.
Published Nov. 30, 2018 10:34 AM
- Last modified May 3, 2019 12:08 PM