SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
A SQUARE PEG IN A
ROUND HOLE
Re-designing high performance computing
infrastructure to meet privacy and ethical
requirements associated with sensitive research
data
KAIT LY N GUT T ERIDGE
RESE AR C H DAT A PRIV ACY AND SECURIT Y OFFICER
UNIVERS IT Y OF BRIT ISH COLUM BI A
Image: Datanami (http://goo.gl/Mi3orK)
Image: NPR (http://goo.gl/kfyF4A)
4
OVERVIEW
1. Scope
2. Context / current situation
3. Dilemma: can’t force a square peg into a round hole
4. Current activities and areas of interest moving forward
5. Lessons learnt
5
SCOPE
• Research data that has been collected on individuals, which has received REB
approval
• New and future users of Compute Canada infrastructure
• Province of BC and within UBC’s governance structure
• Takes into consideration what is / will be in place with Compute Canada Security
Program
• Ethics and privacy lens
6
CONTEXT – ROUND HOLE
7
CONTEXT – SQUARE PEG
• What does this mean for data governed under legislation and ethical
requirements?
• Data governance
• Data sovereignty
• Research data lifecycle
• Access, use, storage, retention, destruction
• Ethical validity
8
CURRENT ACTIVITIES – NATIONALLY
• Compute Canada Security Program
• Security framework, aligned on ISO 27001/27002
• Aims to identify and mitigate gaps caused by CC activities
• Leverage local controls and define requirement for additional controls
• Key goals:
• Better alignment between CC’s services and CC’s strategic vision;
• More efficient implementation of controls for information security;
• Minimization of overall risk;
• Enhancement of trust by external partners;
• Better coordination and response to threats and incident.
9
CURRENT ACTIVITIES – NATIONALLY
• Consultation process between Compute Canada and partner institutions
• Partnerships with organizations and Compute Canada nodes such as:
• BC Genome Sciences Centre
• HPC4Health
• Population Data BC
• Health Data Privacy and Governance Best Practices
• Alignment with other national initiatives including Research Data Canada’s work
10
CURRENT ACTIVITIES – LOCALLY
• UBC Advanced Research Computing (ARC) team
• Free institutional service supporting the high-performance computing and data
management needs of UBC researchers.
• Pre-grant consultation on infrastructure and privacy, security, data management needs
(CFI and non-CFI)
• Data Management Plans – Research Ethics Board integration
• Compliance mapping – UBC and Health Authority requirements on CC infrastructure
11
LESSONS LEARNT SO FAR
TRUST STACK
idea platform other person
12
LESSONS LEARNT SO FAR
CONTEXT
legislative institutional discipline
13
LESSONS LEARNT SO FAR
14
THANK YOU AND QUESTIONS
Kaitlyn Gutteridge
Research Data Privacy and Security Officer, UBC
kaitlyn.gutteridge@ubc.ca
www.arc.ubc.ca

Weitere ähnliche Inhalte

Mehr von Cybera Inc.

Cyber Summit 2016: Technology, Education, and Democracy
Cyber Summit 2016: Technology, Education, and DemocracyCyber Summit 2016: Technology, Education, and Democracy
Cyber Summit 2016: Technology, Education, and Democracy
Cybera Inc.
 
Cyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cyber Summit 2016: Research Data and the Canadian Innovation ChallengeCyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cybera Inc.
 
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cybera Inc.
 

Mehr von Cybera Inc. (20)

Cyber Summit 2016: Technology, Education, and Democracy
Cyber Summit 2016: Technology, Education, and DemocracyCyber Summit 2016: Technology, Education, and Democracy
Cyber Summit 2016: Technology, Education, and Democracy
 
Cyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cyber Summit 2016: Understanding Users' (In)Secure Behaviour
 
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
 
Cyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cyber Summit 2016: Research Data and the Canadian Innovation ChallengeCyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cyber Summit 2016: Research Data and the Canadian Innovation Challenge
 
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big DataCyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
 
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
 
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
 
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
 
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing Data
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing DataCyber Summit 2016: Issues and Challenges Facing Municipalities In Securing Data
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing Data
 
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
 
Privacy, Security & Access to Data
Privacy, Security & Access to DataPrivacy, Security & Access to Data
Privacy, Security & Access to Data
 
Do Universities Dream of Big Data
Do Universities Dream of Big DataDo Universities Dream of Big Data
Do Universities Dream of Big Data
 
Analytics 101: How to not fail at analytics
Analytics 101: How to not fail at analyticsAnalytics 101: How to not fail at analytics
Analytics 101: How to not fail at analytics
 
Are MOOC's past their peak?
Are MOOC's past their peak?Are MOOC's past their peak?
Are MOOC's past their peak?
 
Opening the doors of the laboratory
Opening the doors of the laboratoryOpening the doors of the laboratory
Opening the doors of the laboratory
 
Open City - Edmonton
Open City - EdmontonOpen City - Edmonton
Open City - Edmonton
 
Unlocking the power of healthcare data
Unlocking the power of healthcare dataUnlocking the power of healthcare data
Unlocking the power of healthcare data
 
Checking in on Healthcare Data Analytics
Checking in on Healthcare Data AnalyticsChecking in on Healthcare Data Analytics
Checking in on Healthcare Data Analytics
 
Open access and open data: international trends and strategic context
Open access and open data: international trends and strategic contextOpen access and open data: international trends and strategic context
Open access and open data: international trends and strategic context
 
Integrating Geospatial into the Everyday
Integrating Geospatial into the EverydayIntegrating Geospatial into the Everyday
Integrating Geospatial into the Everyday
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research data

  • 1. A SQUARE PEG IN A ROUND HOLE Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research data KAIT LY N GUT T ERIDGE RESE AR C H DAT A PRIV ACY AND SECURIT Y OFFICER UNIVERS IT Y OF BRIT ISH COLUM BI A
  • 4. 4 OVERVIEW 1. Scope 2. Context / current situation 3. Dilemma: can’t force a square peg into a round hole 4. Current activities and areas of interest moving forward 5. Lessons learnt
  • 5. 5 SCOPE • Research data that has been collected on individuals, which has received REB approval • New and future users of Compute Canada infrastructure • Province of BC and within UBC’s governance structure • Takes into consideration what is / will be in place with Compute Canada Security Program • Ethics and privacy lens
  • 7. 7 CONTEXT – SQUARE PEG • What does this mean for data governed under legislation and ethical requirements? • Data governance • Data sovereignty • Research data lifecycle • Access, use, storage, retention, destruction • Ethical validity
  • 8. 8 CURRENT ACTIVITIES – NATIONALLY • Compute Canada Security Program • Security framework, aligned on ISO 27001/27002 • Aims to identify and mitigate gaps caused by CC activities • Leverage local controls and define requirement for additional controls • Key goals: • Better alignment between CC’s services and CC’s strategic vision; • More efficient implementation of controls for information security; • Minimization of overall risk; • Enhancement of trust by external partners; • Better coordination and response to threats and incident.
  • 9. 9 CURRENT ACTIVITIES – NATIONALLY • Consultation process between Compute Canada and partner institutions • Partnerships with organizations and Compute Canada nodes such as: • BC Genome Sciences Centre • HPC4Health • Population Data BC • Health Data Privacy and Governance Best Practices • Alignment with other national initiatives including Research Data Canada’s work
  • 10. 10 CURRENT ACTIVITIES – LOCALLY • UBC Advanced Research Computing (ARC) team • Free institutional service supporting the high-performance computing and data management needs of UBC researchers. • Pre-grant consultation on infrastructure and privacy, security, data management needs (CFI and non-CFI) • Data Management Plans – Research Ethics Board integration • Compliance mapping – UBC and Health Authority requirements on CC infrastructure
  • 11. 11 LESSONS LEARNT SO FAR TRUST STACK idea platform other person
  • 12. 12 LESSONS LEARNT SO FAR CONTEXT legislative institutional discipline
  • 14. 14 THANK YOU AND QUESTIONS Kaitlyn Gutteridge Research Data Privacy and Security Officer, UBC kaitlyn.gutteridge@ubc.ca www.arc.ubc.ca