This guide explains security best practices for handling survey data downloaded from CheckTick, your responsibilities as a data handler, and what to do if something goes wrong.
Your Responsibility
When you download survey data, you become responsible for protecting it. This includes:
- Storing data securely
- Preventing unauthorized access
- Following data protection laws
- Reporting breaches immediately
- Deleting data when no longer needed
Important: You can be held personally liable for data breaches if you fail to follow security practices.
Before You Download
Check Your Authority
Before downloading data, verify:
- โ You have a legitimate purpose for accessing the data
- โ You have appropriate permissions (Creator/Owner/Custodian)
- โ Downloading is necessary - Can you work with anonymized/aggregated data instead?
- โ You have approval from your organisation (if required)
- โ You understand your obligations under data protection laws
Prepare Your Environment
Ensure your device is secure:
- โ Work device only - Never use personal computers
- โ Full disk encryption enabled (FileVault on macOS, BitLocker on Windows)
- โ Strong password - At least 12 characters, unique
- โ Up-to-date software - Operating system and security patches current
- โ Antivirus/antimalware - Running and updated
- โ Firewall - Enabled and properly configured
- โ Screen lock - Automatic after 5 minutes of inactivity
Check Your Network
Download only over secure networks:
- โ Organisational network - Work VPN or office network
- โ Public WiFi - Never use coffee shops, airports, hotels
- โ Home network - Avoid unless it meets organisational security standards
- โ Mobile hotspot - Avoid unless encrypted and from work device
During Download
Secure Download Process
Follow these steps when downloading:
- Verify the URL - Ensure you're on the genuine CheckTick site
- Accept disclaimer - Read and understand your obligations
- Save password securely - Use password manager, never write it down
- Download to encrypted location - Work drive, not Downloads folder
- Verify download - Check file size and integrity
- Delete browser history - Clear download history after saving
Password Management
The ZIP password is critical:
- โ Use password manager - LastPass, 1Password, Bitwarden, etc.
- โ Copy carefully - No typos, no extra spaces
- โ Save immediately - Before closing the download page
- โ Never email - Even to yourself
- โ Never write down - Not on paper, sticky notes, or text files
- โ Never share - Except with authorized colleagues via secure method
Immediate Actions
After downloading:
- Move to secure location - Encrypted folder on work drive
- Extract the ZIP - In the same secure location
- Delete ZIP file - Keep only extracted files
- Verify contents - Check all expected files are present
- Set file permissions - Restrict to only yourself
- Close download link - Clear from browser
Storing Data Securely
Location Requirements
Store downloaded data:
Approved Locations: - โ Encrypted work device hard drive - โ Organisation-managed network drive (if encrypted) - โ Organisation-approved secure cloud (e.g., Azure with encryption) - โ Secure server with access controls
Prohibited Locations: - โ USB drives or external hard drives - โ Personal cloud storage (Dropbox, Google Drive, iCloud, OneDrive personal) - โ Personal email attachments - โ Unencrypted network shares - โ Shared drives without access controls - โ Personal devices (laptops, phones, tablets) - โ Physical printouts (unless absolutely necessary and secured)
File Organisation
Organize files securely:
Folder Structure:
/secure_work_folder/
โโโ census_data/
โโโ 2025/
โ โโโ survey_12345/
โ โ โโโ survey_data.csv
โ โ โโโ metadata.json
โ โ โโโ README.txt
โ โโโ survey_67890/
โโโ archive/
Best Practices: - Use descriptive folder names (but avoid PII in folder names) - Keep different surveys separate - Archive old data separately - Delete entire folder structure when done
File Permissions
Set strict permissions:
On Windows: 1. Right-click file/folder โ Properties โ Security 2. Remove "Everyone" and "Users" groups 3. Keep only your user account 4. Set to "Full Control" for you only
On macOS: 1. Right-click file/folder โ Get Info โ Sharing & Permissions 2. Remove "everyone" and "staff" 3. Keep only your user account 4. Set to "Read & Write" for you only
On Linux:
chmod 600 survey_data.csv # Read/write for owner only
chmod 700 census_data/ # Full access for owner only
Encryption
Layer encryption for maximum security:
Level 1: Full Disk Encryption
- Already provided by FileVault/BitLocker
- Protects if device is stolen
Level 2: Folder Encryption
- Use VeraCrypt or similar to create encrypted container
- Protects even if device is accessed while running
Level 3: File Encryption
- CSV files can be encrypted with tools like GPG
- Protects if file is copied elsewhere
Recommended: At minimum, use Levels 1 and 2.
Using Data Securely
Working with Data
When analyzing data:
- โ Close door/curtains - Prevent shoulder surfing
- โ Privacy screen filter - On your monitor
- โ Lock screen - When leaving desk, even briefly
- โ Minimize windows - When not actively using
- โ Use secure viewer - Excel/R/Python with data at rest encryption
- โ Never screen share - Without ensuring no sensitive data visible
- โ Never present - With raw data on screen in public spaces
Sharing Within Your Organisation
If you must share data with colleagues:
Approved Methods:
- โ Secure file share (organisation-approved)
- โ Encrypted email (if organisation supports it)
- โ Hand delivery on encrypted USB (if policy allows)
- โ Through CheckTick itself (add them as data custodian)
Prohibited Methods:
- โ Unencrypted email
- โ Personal email (Gmail, Yahoo, etc.)
- โ Cloud sharing links (Dropbox, Google Drive, WeTransfer, etc.)
- โ Instant messaging (Slack, Teams, WhatsApp, etc.)
- โ Social media
- โ Physical printouts left unsecured
Before Sharing:
- Verify recipient has legitimate need
- Confirm they have appropriate permissions
- Use password-protected ZIP (new password, shared separately)
- Notify via separate channel (e.g., phone call)
- Log the share in your own records
Sharing Outside Your Organisation
Generally prohibited without specific approval.
If absolutely necessary:
- Get written approval from organisation owner
- Ensure data sharing agreement is signed
- Anonymize/pseudonymize data if possible
- Use secure transfer method
- Log the transfer
- Audit recipient's security practices
Deleting Data Securely
When to Delete
Delete data when:
- โ Analysis is complete
- โ Report is published
- โ No longer needed for stated purpose
- โ Retention period expires
- โ Participant requests deletion (right to erasure)
- โ You leave the organisation
- โ Project is cancelled
Don't keep data "just in case" - This violates data minimization principles.
Secure Deletion Methods
Simple Delete (Not Sufficient):
- Moving to Trash/Recycle Bin does not delete
- Standard "Empty Trash" can be recovered
- Not acceptable for sensitive data
Secure File Deletion:
On Windows:
- Use SDelete from Microsoft Sysinternals
- Or:
cipher /w:C:\folder(built-in)
On macOS:
- Use
srmcommand (if available) - Or: Disk Utility โ Erase Free Space โ "Most Secure"
On Linux:
- Use
shred -vfz -n 10 survey_data.csv - Or:
wipe -rfq census_data/
In Python (for programmatic deletion):
import os
import random
def secure_delete(file_path, passes=7):
with open(file_path, "ba+") as f:
length = f.tell()
for _ in range(passes):
f.seek(0)
f.write(os.urandom(length))
os.remove(file_path)
Verify Deletion
After secure deletion:
- Check Trash/Recycle Bin - Should be empty
- Search for file - Should not be found
- Check backups - Ensure backups are also purged (if you control them)
- Document deletion - Log date and method in your records
Cloud Storage Deletion
If data was stored in cloud:
- Delete from cloud storage
- Empty cloud trash/recycle bin
- Check "version history" - Delete all versions
- Verify deletion in cloud provider's audit log
- Contact provider if permanent deletion needed (some providers retain deleted data)
Data Breach Response
What Counts as a Breach?
A data breach includes:
- Unauthorized access to data
- Accidental email to wrong person
- Lost or stolen device containing data
- Ransomware/malware infection on device with data
- Unauthorized copying or sharing
- Data left unattended in public space
- Improper disposal (e.g., not securely deleted)
Even small breaches must be reported.
Immediate Actions (Within Minutes)
If you suspect a breach:
- Stop - Don't make it worse (e.g., don't forward the email again)
- Contain - Disconnect device from network if infected
- Preserve evidence - Don't delete logs or emails
- Notify immediately - Contact organisation owner and Data Protection Officer
Call, don't email - Breaches are urgent.
Reporting Requirements
Within 1 hour: - Notify your organisation owner - Notify Data Protection Officer (if your organisation has one) - Notify IT security team
Within 24 hours: - Provide written incident report: - What happened - When it happened - What data was affected (how many records, what type) - Who may have accessed the data - What you've done to contain it
Within 72 hours (if required by law): - Your organisation must report to regulatory authority (ICO in UK, etc.) - You must cooperate fully with investigation
What NOT to Do
During a breach:
- โ Don't hide it - Covering up makes legal consequences worse
- โ Don't try to "fix" it yourself - You may destroy evidence
- โ Don't contact affected individuals - Organisation will handle this
- โ Don't discuss publicly - Including social media
- โ Don't delete anything - Even if you think it helps
Consequences
Data breaches can result in:
- Personal liability - Fines up to ยฃ17 million or 4% of organisational turnover (GDPR)
- Disciplinary action - Up to and including termination
- Criminal prosecution - In serious cases
- Professional sanctions - Loss of licenses/certifications
- Civil lawsuits - From affected individuals
- Reputational damage - Both personal and organisational
This is serious. Follow security practices carefully.
Security Checklist
Daily Practices
- Lock screen when leaving desk (even briefly)
- Close data files when not actively using
- Use privacy screen on monitor
- Keep work area clear of printouts
- Shut down or lock computer at end of day
Weekly Practices
- Check for software updates (OS, antivirus, etc.)
- Review who has access to shared files
- Clean up old data no longer needed
- Verify backups are encrypted
- Review password manager for weak passwords
Monthly Practices
- Review all downloaded data - still needed?
- Securely delete old data
- Check retention periods in CheckTick
- Audit file permissions
- Review organisational security policies
Getting Help
Security Questions
For questions about: - Security best practices โ Contact IT security team - Data protection law โ Contact Data Protection Officer - Organisational policy โ Contact organisation owner - CheckTick security features โ See Data Policy
Reporting Issues
Report immediately if: - You suspect a breach - You receive suspicious emails about CheckTick - You notice unauthorized access to data - You're unsure if something is a security issue
Contact: - Organisation owner: [Set in organisation settings] - Data Protection Officer: [Set in organisation settings] - IT Security: [Your organisation's IT security contact]
Emergency Contacts
Outside Business Hours: - Critical breach: Call organisation emergency number - Device lost/stolen: Call IT security hotline - Ransomware: Disconnect device, call IT security
Training and Awareness
Required Training
Before downloading data, ensure you have completed:
- Data protection awareness training
- Information security training
- Your organisation's data handling training
- CheckTick-specific training (if provided)
Ongoing Learning
Stay informed about:
- Changes to data protection laws
- New security threats (phishing, ransomware, etc.)
- Organisational policy updates
- CheckTick feature updates
Testing Your Knowledge
Regularly test yourself:
- Would you recognize a phishing email?
- Do you know how to report a breach?
- Can you securely delete a file?
- Do you understand your legal obligations?
Legal and Compliance
GDPR Obligations
Under GDPR, you must:
- Lawful basis - Have legal grounds for processing (usually "legitimate interest" or "consent")
- Data minimization - Only download data you need
- Purpose limitation - Use data only for stated purpose
- Accuracy - Ensure data is correct
- Storage limitation - Delete when no longer needed
- Integrity and confidentiality - Keep data secure (this guide)
- Accountability - Document your compliance
UK Data Protection Act 2018
Additional UK requirements:
- Comply with Data Protection Principles
- Respect individual rights (access, rectification, erasure)
- Report breaches to ICO within 72 hours (if required)
- Appoint Data Protection Officer (if required)
NHS Data Security and Protection Toolkit
If handling NHS data:
- Complete annual DSP Toolkit assessment
- Meet all mandatory standards
- Implement role-based access control
- Audit all data access
- Encrypt data at rest and in transit
Caldicott Principles
For health and social care data:
- Justify purpose - Legitimate basis for using confidential information
- Don't use unless absolutely necessary
- Use minimum necessary
- Access on strict need-to-know basis
- Everyone must understand their responsibilities
- Understand and comply with the law
- Duty to share information can be as important as duty to protect confidentiality
Related Guides
- Data Governance Overview - Understanding data governance
- Data Export Guide - How to download data
- Data Retention Policy - How long data is kept
- Data Policy - Formal data protection policy
Remember
Security is not just about technology - it's about behavior.
- Be vigilant
- Think before you click
- When in doubt, ask
- Report incidents immediately
- You are responsible for protecting the data you download
If you can't follow these security practices, don't download the data.