layout | title | permalink | nav | weight |
---|---|---|---|---|
page |
Transferring Data |
/transferring-data/ |
true |
5 |
This section will give an overview of the steps involved in transferring data as part of a data request.
Depending on the data request, the data owner may need to de-identify data in order to protect the privacy and rights of the individuals represented in the data. There are a number of ways to de-identify data, and these are summarized below.
One way to de-identify data is to remove all of the fields that could be used to identify a specific individual from the data. Examples include names, phone numbers, and birthdays. (For more information about confidential data, see the section Document critical data elements.)
Data owners can also choose to aggregate data. This is accomplished by providing counts of specific fields for a dataset. For example, sensitive fields like birthday and address can be converted to age range and zip code in order to provide the counts of each age group living in a specific area.
When aggregating data, it’s important to ensure that groups aren’t split up so much that it’s still possible to identify individuals. For example, if you’re aggregating based on school, test scores, grade, and race and ethnicity, the counts can’t be small enough for someone to identify individual students.
Once the parties have agreed to share data, it’s time to consider the logistics of transferring the data. The method will vary based on the sensitivity of the data.
Data that is open to the public doesn’t require a secure channel for data transfer. Some options that might be suited for file transfers are:
Technology | File size limits | Usage notes |
---|---|---|
Email (ct.gov and po.state.ct.us) | 20MB, 35MB | 35MB but depends on the recipients size limit also, they could have a 20MB limit. |
Microsoft Office 360 OneDrive (ct.gov and po.state.ct.us) | 100GB | |
Approved external device | varies | Ask IT department for more information |
Shared network drive | varies | Ask IT department for more information |
All data that isn’t open to the public should be transferred through secure channels. These data include data governed by HIPAA, FERPA, or state laws and data that are confidential, subject to misuse, or simply not authorized for public consumption due to outstanding approval.
Failure to transfer non-public data securely may result in harm to citizens, lawsuits filed against the responsible government office, and severe professional consequences for the offending employee. It’s important to pay careful attention when sharing non-public data. Secure channels include:
Technology | File size limits | Usage notes |
---|---|---|
Government-approved SFTP service | {::nomarkdown}
|
{::nomarkdown}
|
Government-approved Encrypted External Drive | varies | {::nomarkdown}
|
To accelerate secure data transfer, zip and encrypt data files before initiating a data transfer.
To zip a file:
- Right-click on file or folder
- Navigate to “Send to” option
- Click on “Compressed (zipped) folder”
To encrypt a file:
- Right-click on the zipped folder and open Properties.
- Under the General tab, click Advanced.
- Check the “Encrypt contents to secure data” box.
The Department of Administrative Services Bureau of Information Technology Solutions (BITS) offers Executive Branch agencies an Enterprise Secure File Transport (SFT) Service for agencies that need to share sensitive content between other agencies, or business partners in a secure manner.
More information can be found on the DAS website here. The website states that this service offers the following:
- Powered by the Axway Secure Transport solution, an industry leader in managed file transport solutions.
- Provides for the exchange of file based content that ensures protection and encryption in transit and at rest.
- Meets the federal government’s strict security compliance requirements,
- Supports the use of a web-based file management environment as well as traditional secure file transport clients (e.g., FileZilla),
- Is part of the state’s data center ecosystem, providing a secure and highly available environment.
- Leverages the data center’s virtualization and storage services to further enhance reliability.
- Is available 24 X 7 X 365, including critical incident response.
- Customer support is available from 8:00 AM to 4:00 PM, Monday through Friday.
Use of our Enterprise Secure File Transport Service has the following conditions:
- Each agency who has enrolled in this service will need to appoint a primary and alternate SFT Liaison, with whom we will work on matters associated with your agency’s use of this system. The SFT Liaison will be granted an elevated level of permissions to provide basic support to your agency (e.g., password resets, etc.)
- Content on the SFT environment is considered transitional and is automatically purged after 60 days.
See Appendix A for a step by step guide to using SFTP.