Data management and academic integrity

Material image
Published: 09.10.2025
Rated: 0x Viewed: 371x

Sensitive data requires careful consideration and adherence to best practices to ensure its confidentiality, integrity, and availability. Essential steps in handling sensitive data are identification and classification of sensitive data, implementation of data access control, encryption of sensitive data, secure storage and transmission, implementation of data breach response plan, backup and monitoring usage of data, complying with regulation, and disposing of data securely. Misconduct in handling sensitive data can compromise data confidentiality, integrity, and availability. These include data breaches (unauthorised access or disclosure, theft, insider threats, falsification, fabrication, imputation, and amputation of data), failure to comply with data protection regulations, inadequate data security practices, improper retention and disposal of data, and failure to report data breaches and incidents. This lecture will present how to manage sensitive data, desensitise it, and which are the most common breaches in handling sensitive data incidents.

Attached links

Downloadable files

WARNING: This is a sample tooltip text. It should never be displayed if your javascript is running correctly.

Go up