Attackers don’t read your SOPS

Danny Lieberman
Back to the future of work
2 min readJul 20, 2023

--

Image by Pexels from Pixabay

Attackers don’t read your SOPs. They do not care about your quality management system. If they see an open gate on a private road into your CRO’s data management system, they will just walk in.

This is the difference between feeling secure and being secure.

The public discussion on patient privacy often centers on de-identification of patient information Data de-identification is an important first step in maintaining privacy when dealing with sensitive data.

However, there are additional aspects to consider when it comes to data security and privacy, especially in a cloud-based environment.

  1. Encryption: Ensure your data is encrypted both at rest and in transit. Encryption transforms your data into a format that can only be read with a decryption key, providing an additional layer of security.
  2. Access Control: Implement strict access controls to limit who can access your data. This often involves setting up roles and permissions to ensure that individuals can only access the data they need for their work.
  3. Audit Logs: Maintain audit logs of all access to and use of your data. This can help you monitor for any inappropriate access or use.
  4. Security Management Policies: Establish clear security management policies, including policies for threat modeling and periodic update of your risk model or when there is a major change to your systems.Make sure these policies are communicated to all team members.
  5. Security of Machine Learning Models: Consider the privacy and security of your machine learning models as well. Models trained on sensitive data can sometimes reveal information about that data, even if the data itself has been de-identified.
  6. Vendor Security: When using cloud services or other third-party tools, make sure to assess their security policies and certifications. They should adhere to industry best practices and have a strong reputation for data security.
  7. Incident Response Plan: Have a plan in place for responding to security incidents, including identifying the incident, containing the impact, and notifying any affected parties.

Data privacy and security is an ongoing process, not a one-time event. It’s important to regularly review and update your security practices, train team members, and stay informed about current threats and best practices. Consult with a data security expert or legal advisor to ensure you’re covering all bases.and zero-knowledge.

--

--