You are here: Home / Contracts / Security Plans

Security Plans for Restricted-Use Data

cd_lock_bw

Below are a number of different locations where you might choose to store the Add Health data.

Please select the location you plan to use, then read "How to secure ..." to see the essential components of a good security plan for that location. Finally, complete "Form to describe your security plan" for that location and submit it with the rest of the contract.

If your location is not listed, or if you need assistance with the security plan, please email addhealth_contracts@unc.edu.

For other resources on securing your data, please see the following Security Links.

Data stored on a stand-alone desktop computer

A stand-alone computer is one that is in no way connected to another computer or networked device such as a switch or router.

Security plan form and information on how to secure a stand-alone desktop computer

Data stored on an encrypted external hard drive

The external hard drive is a modified version of the stand-alone computer, in effect keeping the Add Health data off the Internet or a local area network (LAN), while using your daily-use computer.

Security plan form and information on how to secure an external hard drive

Data stored on a Windows computer connected to a network

A network is two or more computers and/or network devices (e.g., printer, switch, router) connected to the Internet or a LAN.

Security plan form and information on how to secure a Windows computer connected to a network

Data stored on a Macintosh computer connected to a network

A network is two or more computers and/or network devices (e.g., printer, switch, router) that are connected to the Internet or a LAN.

Security plan form and information on how to secure a Macintosh computer connected to a network

Data stored on a Server

A server can be used as a File Server (files reside on the server, but are served to the user's computer over the network) or as a Compute Server (files are stored on the server and all processing of the data files are done on the server: data files are not served to the user's computer over the network).

Security plan form and information on how to secure a server