Sharing

decorative

This includes but is not limited to:

  • distribute data;
  • share data;
  • control access;
  • establish copyright;
  • promote data;
  • produce research outputs;
  • author publications;
  • prepare data for preservation.
  • Use the data classification definitions found here to help you through this process.

Select which class of data you are working with:

Confidental Data

Action: Granting permission to view information internally (printed information)

  • Treatment - Print: Read access is restricted using various access control methods and is based on roles, classes, entitlements, or affiliations defined by respective Data Stewards or their designate. Refer to UWO Guideline on Access to Information and Protection of Privacy - MAPP 1.23.
  • Treatment - Electronic: N/A

Action: Granting permission to view data (including duplication) electronically

  • Treatment - Print: N/A
  • Treatment - Electronic: Read access is restricted using various access control methods and is based on roles, classes, entitlements, or affiliations defined by respective Data Steward or their designate. Refer to UWO Guideline on Access to Information and Protection of Privacy - MAPP 1.23.

Action: Granting permission to create or modify data electronically

  • Treatment - Print: N/A
  • Treatment - Electronic: Read access is restricted using various access control methods and is based on roles, classes, entitlements, or affiliations defined by respective Data Steward or their designate. Refer to UWO Guideline on Access to Information and Protection of Privacy - MAPP 1.23.

Action: Granting permission to delete data electronically

  • Treatment - Print: N/A
  • Treatment - Electronic: Deletions are restricted using various access control methods and are based on roles, classes, entitlements, or affiliations defined by respective Data Steward or their designate. Also adhere to records management requirements for deleting data. Refer to Records Management Services.

Action: Preventing data disclosure to unauthorized requestors (e.g. social engineering, Phishing)

  • Treatment - Print: Consider what is being requested and who is requesting it. If the requestor's credentials or authenticity cannot be 100% assured, do not disclose any information. Escalate the situation to a supervisor, or to the Information Security Office.
  • Treatment - Electronic: Consider what is being requested and who is requesting it. If the requestor's credentials or authenticity cannot be 100% assured, do not disclose any information. Escalate the situation to a supervisor, or to the Information Security Office.

Action: Preventing unauthorized viewing or eavesdropping or data (e.g. shoulder surfering)

  • Treatment - Print: Be aware of individuals who are not authorized to view the information. Be conscious of documents in plain view.
  • Treatment - Electronic: Implement privacy screens on monitors that are in high-traffic areas. Be aware of individuals who are not authorized to view the information. Be conscious of information in plain view. Log out of your workstation when not in use.

Action: Sharing Data

  • Treatment - Print: Create a Data Sharing Agreement with the party that will be recieving the data. For more information, contact ciso@uwo.ca. Adhere to all requirements external to Western; external users accessing data residing at Western must adhere to data teatment standards.
  • Treatment - Electronic: Create a Data Sharing Agreement with the party that will be recieving the data. For more information, contact ciso@uwo.ca. Adhere to all requirements external to Western; external users accessing data residing at Western must adhere to data teatment standards.

Sensitive Data

Action: Granting permission to view information internally (printed information)

  • Treatment - Print: Read access is restricted using various access control methods and is based on roles, classes, entitlements, or affiliations as defined by respective Data Steward or their designate. Refer to UWO Guideline on Access to Information and Protection of Privacy - MAPP 1.23.
  • Treatment - Electronic: N/A

Action: Granting permission to view data (including duplication) electronically

  • Treatment - Print: N/A
  • Treatment - Electronic: Read access is restricted using various access control methods and is based on roles, classes, entitlements, or affiliations as defined by respective Data Steward or their designate. Refer to UWO Guideline on Access to Information and Protection of Privacy - MAPP 1.23.

Action: Granting permission to create or modify data electronically

  • Treatment - Print: N/A
  • Treatment - Electronic: Read access is restricted using various access control methods and is based on roles, classes, entitlements, or affiliations as defined by respective Data Steward or their designate. Refer to UWO Guideline on Access to Information and Protection of Privacy - MAPP 1.23.

Action: Granting permission to delete data electronically

  • Treatment - Print: N/A
  • Treatment - Electronic: Deletions are restricted using various access control methods and are based on roles, classes, entitlements, or afflilations defined by respective Data Steward or their designate. Refer to Records Management Services.

Action: Preventing data disclosure to unauthorized requestors (e.g. social engineering, Phishing)

  • Treatment - Print: Consider what is being requested and who is requesting it. If the requestor's credentials or authenticity cannot be 100% assured, do not disclose any information. Escalate the situation to a supervisor, or to the Information Security Office.
  • Treatment - Electronic: Consider what is being requested and who is requesting it. If the requestor's credentials or authenticity cannot be 100% assured, do not disclose any information. Escalate the situation to a supervisor, or to the Information Security Office.

Action: Preventing unauthorized viewing or eavesdropping or data (e.g. shoulder surfering)

  • Treatment - Print: Be aware of individuals who are not authorized to view the information. Be conscious of documents in plain view.
  • Treatment - Electronic: Implement privacy screens on monitors that are in high-traffic areas. Be aware of individuals who are not authorized to view the information. Be conscious of information in plain view. Log out of or lock your workstation when not in use.

Action: Sharing Data

  • Treatment - Print: Create a Data Sharing Agreement with the party that will be receiving the data. For more information, contact cisco@uwo.ca. Adhere to all requirements external to Western; external user accessing data residing at Western must adhere to data treatment standards.
  • Treatment - Electronic: Create a Data Sharing Agreement with the party that will be receiving the data. For more information, contact cisco@uwo.ca. Adhere to all requirements external to Western; external user accessing data residing at Western must adhere to data treatment standards.

Public Data

Action: Granting permission to view information internally (printed information)

  • Treatment - Print: No special requirements
  • Treatment - Electronic: N/A

Action: Granting permission to view data (including duplication) electronically

  • Treatment - Print: N/A
  • Treatment - Electronic: No special requirements

Action: Granting permission to create or modify data electronically

  • Treatment - Print: N/A
  • Treatment - Electronic: No special requirements

Action: Granting permission to delete data electronically

  • Treatment - Print: N/A
  • Treatment - Electronic: No special requirements

Action: Preventing data disclosure to unauthorized requestors (e.g. social engineering, Phishing)

  • Treatment - Print: No special requirements
  • Treatment - Electronic: No special requirements

Action: Preventing unauthorized viewing or eavesdropping or data (e.g. shoulder surfering)

  • Treatment - Print: No special requirements
  • Treatment - Electronic: No special requirements

Action: Sharing Data

  • Treatment - Print: No special requirements
  • Treatment - Electronic: No special requirements

Published on  and maintained in Cascade CMS.