Skip to content

Library Secure Data Room

 
Access to and Use of Sensitive Data for Research Using the Secure Data Room, Badia Library Workspaces in the Secure Data Room

 ▪ The Library provides support for EUI members using highly restricted data. Some data providers request guarantees of extra security measures for access to, and use of, sensitive data. Scholars should send the following information to [email protected]

 

- Name of data issuer/publisher

- Title of dataset, with internet link (if available)

- Names of research team members (EUI and external), with email contacts

- What special conditions are required for access to the data (eg. remote protocol)?

- What special conditions are required for use of the data?

- Does the data issuer require a contract counter-signature from the EUI Data Protection Officer?

- Does the data issuer require that the data be used in a secure data room?

- Does the data issuer require that the data be used on a stand-alone, off-line computer?

- For projects with non-EUI collaborators: What controller/processing operations will be undertaken by research partners?


▪ Some data providers require EUI Ethics Committee approval and/or DPO oversight. The Principal Investigator should initiate the request.

▪ If required by the data issuer, the ICT Data Security Officer can provide a description of ICT security protocols and infrastructure: [email protected]


 

 ▪ The Secure Data Room, BF-173, is located on the upper floor of the Library, Badia Fiesolana.

 

 ▪  The Room is only accessible to EUI scholars using data provided under contracts requiring that data be used in a locked room and/or require other restricted physical, or additional access protocols. The room is not for general data access and use.

 

▪ The names of scholars who are authorised to access the Secure Data Room are indicated on the door label.  Only the users listed, and Library staff, can access the Room.

 

▪ New EUI data users who require access to the Secure Data Room, should send a copy of their data access contract to [email protected]

 

▪ Authorised users can use a computer (Monday to Saturday) in workspaces #1, #2 or #6. (Workspaces #3, and #4  are reserved for specific datasets workspace #5 is for use of authorized laptops)

 

▪ To access the Secure Data Room, scholars should enter the Library via the lower loggia; ascend to the first floor and show their EUI card at the Library Loan Desk where the key will be issued. The key must be returned to the Loan Desk after the user session.

 

▪ Scholars are co-responsible for keeping the space accessible to authorised users only.  Only those EUI members listed on the door label can access the Secure Data Room.


▪  For support, write to [email protected]

Workspaces #1, #2 or #6 can be used on a first-come first-serve modality


▪ (Workspaces #3 and #4 are reserved for specific datasets.)


▪ Workspace #5 is reserved for stand-alone, secure remote connection hardware.

▪ Only EUI members who have already been approved for access to the SDR can register (see centre column)


▪ For assistance, write to [email protected]

 

 


 

 

 


Page last updated on 03 October 2024

Go back to top of the page