cyber summit 2016: a square peg in a round hole: re-designing high performance computing...

14
A SQUARE PEG IN A ROUND HOLE Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research data KAITLYN GUTTERIDGE RESEARCH DATA PRIVACY AND SECURITY OFFICER UNIVERSITY OF BRITISH COLUMBIA

Upload: cybera-inc

Post on 23-Jan-2018

95 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

A SQUARE PEG IN A ROUND HOLERe-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research data

K AI T L Y N G U T T E R I D G ER E S E AR C H D AT A P R I V AC Y AN D S E C U R I T Y O F F I C E RU N I V E R S I T Y O F B R I T I S H C O L U M B I A

Page 2: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

Image: Datanami (http://goo.gl/Mi3orK)

Page 3: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

Image: NPR (http://goo.gl/kfyF4A)

Page 4: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

4

OVERVIEW

1. Scope

2. Context / current situation

3. Dilemma: can’t force a square peg into a round hole

4. Current activities and areas of interest moving forward

5. Lessons learnt

Page 5: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

5

SCOPE

• Research data that has been collected on individuals, which has received REB

approval

• New and future users of Compute Canada infrastructure

• Province of BC and within UBC’s governance structure

• Takes into consideration what is / will be in place with Compute Canada Security

Program

• Ethics and privacy lens

Page 6: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

6

CONTEXT – ROUND HOLE

Page 7: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

7

CONTEXT – SQUARE PEG

• What does this mean for data governed under legislation and ethical requirements?

• Data governance

• Data sovereignty

• Research data lifecycle

• Access, use, storage, retention, destruction

• Ethical validity

Page 8: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

8

CURRENT ACTIVITIES – NATIONALLY

• Compute Canada Security Program• Security framework, aligned on ISO 27001/27002 • Aims to identify and mitigate gaps caused by CC activities• Leverage local controls and define requirement for additional controls

• Key goals:• Better alignment between CC’s services and CC’s strategic vision;• More efficient implementation of controls for information security;• Minimization of overall risk;• Enhancement of trust by external partners;• Better coordination and response to threats and incident.

Page 9: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

9

CURRENT ACTIVITIES – NATIONALLY

• Consultation process between Compute Canada and partner institutions

• Partnerships with organizations and Compute Canada nodes such as: • BC Genome Sciences Centre• HPC4Health• Population Data BC

• Health Data Privacy and Governance Best Practices

• Alignment with other national initiatives including Research Data Canada’s work

Page 10: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

10

CURRENT ACTIVITIES – LOCALLY

• UBC Advanced Research Computing (ARC) team • Free institutional service supporting the high-performance computing and data

management needs of UBC researchers.

• Pre-grant consultation on infrastructure and privacy, security, data management needs (CFI and non-CFI)

• Data Management Plans – Research Ethics Board integration

• Compliance mapping – UBC and Health Authority requirements on CC infrastructure

Page 11: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

11

LESSONS LEARNT SO FAR

TRUST STACKidea platform other person

Page 12: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

12

LESSONS LEARNT SO FAR

CONTEXTlegislative institutional discipline

Page 13: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

13

LESSONS LEARNT SO FAR

Page 14: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

14

THANK YOU AND QUESTIONS

Kaitlyn GutteridgeResearch Data Privacy and Security Officer, [email protected]