Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing...

14
A SQUARE PEG IN A ROUND HOLE Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research data KAITLYN GUTTERIDGE RESEARCH DATA PRIVACY AND SECURITY OFFICER UNIVERSITY OF BRITISH COLUMBIA

Transcript of Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing...

Page 1: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

A SQUARE PEG IN A ROUND HOLERe-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research data

K AI T L Y N G U T T E R I D G ER E S E AR C H D AT A P R I V AC Y AN D S E C U R I T Y O F F I C E RU N I V E R S I T Y O F B R I T I S H C O L U M B I A

Page 2: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

Image: Datanami (http://goo.gl/Mi3orK)

Page 3: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

Image: NPR (http://goo.gl/kfyF4A)

Page 4: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

4

OVERVIEW

1. Scope

2. Context / current situation

3. Dilemma: can’t force a square peg into a round hole

4. Current activities and areas of interest moving forward

5. Lessons learnt

Page 5: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

5

SCOPE

• Research data that has been collected on individuals, which has received REB

approval

• New and future users of Compute Canada infrastructure

• Province of BC and within UBC’s governance structure

• Takes into consideration what is / will be in place with Compute Canada Security

Program

• Ethics and privacy lens

Page 6: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

6

CONTEXT – ROUND HOLE

Page 7: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

7

CONTEXT – SQUARE PEG

• What does this mean for data governed under legislation and ethical requirements?

• Data governance

• Data sovereignty

• Research data lifecycle

• Access, use, storage, retention, destruction

• Ethical validity

Page 8: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

8

CURRENT ACTIVITIES – NATIONALLY

• Compute Canada Security Program• Security framework, aligned on ISO 27001/27002 • Aims to identify and mitigate gaps caused by CC activities• Leverage local controls and define requirement for additional controls

• Key goals:• Better alignment between CC’s services and CC’s strategic vision;• More efficient implementation of controls for information security;• Minimization of overall risk;• Enhancement of trust by external partners;• Better coordination and response to threats and incident.

Page 9: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

9

CURRENT ACTIVITIES – NATIONALLY

• Consultation process between Compute Canada and partner institutions

• Partnerships with organizations and Compute Canada nodes such as: • BC Genome Sciences Centre• HPC4Health• Population Data BC

• Health Data Privacy and Governance Best Practices

• Alignment with other national initiatives including Research Data Canada’s work

Page 10: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

10

CURRENT ACTIVITIES – LOCALLY

• UBC Advanced Research Computing (ARC) team • Free institutional service supporting the high-performance computing and data

management needs of UBC researchers.

• Pre-grant consultation on infrastructure and privacy, security, data management needs (CFI and non-CFI)

• Data Management Plans – Research Ethics Board integration

• Compliance mapping – UBC and Health Authority requirements on CC infrastructure

Page 11: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

11

LESSONS LEARNT SO FAR

TRUST STACKidea platform other person

Page 12: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

12

LESSONS LEARNT SO FAR

CONTEXTlegislative institutional discipline

Page 13: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

13

LESSONS LEARNT SO FAR

Page 14: Cyber Summit 2016: A square peg in a round hole: Re-designing high performance computing infrastructure to meet privacy and ethical requirements associated with sensitive research

14

THANK YOU AND QUESTIONS

Kaitlyn GutteridgeResearch Data Privacy and Security Officer, [email protected]