Staff Responsibilities for using SecureBox service
- Use only the designated, certified workstation(s) to access the SecureBox folder.
- Use a VPN connection when accessing the data from a remote location.
- The SecureBox Folder owner must work with any external collaborators to ensure that the workstation(s) they are using meets these security guidelines as outlined in the Workstation Security Requirements document: Secure-Endpoint-Configuration-Matrix (10-22-20).
- Ensure that data acquisition stored in the SecureBox folder uses one of the following methods:
- Encrypted drive (external or USB)
- Secure Web portal using HTTPS
- Secure File Transfer Protocol
- Ensure that if data is to be temporarily stored outside of the SecureBox folder, that the following approved locations are used:
- Encrypted external hard drive which employs hardware-based encryption
- USB thumb drive which employs hardware-based encryption.
- The Secured computer’s encrypted internal hard drive
- Box-Edit may be used on a secured workstation.
IT department security requirements
- Maintain an accurate list of workstations accessing the SecureBox folder.
- Regularly review and remediate identified Qualys compliance gaps and vulnerabilities.
- For gaps that cannot be remediated, mitigation strategy must be documented and uploaded into the SecureBox compliance folder.
- Maintain an accurate user list, with appropriate access rights for the SecureBox folder.
- Complete a written procedure for handling data while in use and train staff on the use of a SecureBox folder. This procedure must also define what a remote location is and how to use the VPN when remote.
- Produce monthly reports validating that the asset remains in compliance and is being updated and patched appropriately.
Statistical results, which do not contain any HIPAA identifiers can be stored on other systems. These shall not contain any dates (other than year alone), or any other HIPAA identifiers, from the original data set. If any uncertainly exists to the exact definition of what constitutes a Limited Data Set PHI, contact the UW–Madison HIPAA Privacy Officer.
This is an accordion element with a series of buttons that open and close related content panels.
Workstation requirements for non UW–Madison/external collaborators
All collaborator’s listed as accessing SecureBox folder should fill out and submit an Endpoint Security Checklist (pdf).
FAQs
This is an accordion element with a series of buttons that open and close related content panels.