This guide explains security best practices for handling survey data downloaded from CheckTick, your responsibilities as a data handler, and what to do if something goes wrong.
Your Responsibility
When you download survey data, you become responsible for protecting it. This includes:
- Storing data securely
- Preventing unauthorized access
- Following data protection laws
- Reporting breaches immediately
- Deleting data when no longer needed
Important: You can be held personally liable for data breaches if you fail to follow security practices.
Before You Download
Check Your Authority
Before downloading data, verify:
- โ You have a legitimate purpose for accessing the data
- โ You have appropriate permissions (Creator/Owner/Custodian)
- โ Downloading is necessary - Can you work with anonymized/aggregated data instead?
- โ You have approval from your organization (if required)
- โ You understand your obligations under data protection laws
Prepare Your Environment
Ensure your device is secure:
- โ Work device only - Never use personal computers
- โ Full disk encryption enabled (FileVault on macOS, BitLocker on Windows)
- โ Strong password - At least 12 characters, unique
- โ Up-to-date software - Operating system and security patches current
- โ Antivirus/antimalware - Running and updated
- โ Firewall - Enabled and properly configured
- โ Screen lock - Automatic after 5 minutes of inactivity
Check Your Network
Download only over secure networks:
- โ Organizational network - Work VPN or office network
- โ Public WiFi - Never use coffee shops, airports, hotels
- โ Home network - Avoid unless it meets organizational security standards
- โ Mobile hotspot - Avoid unless encrypted and from work device
During Download
Secure Download Process
Follow these steps when downloading:
- Verify the URL - Ensure you're on the genuine CheckTick site
- Accept disclaimer - Read and understand your obligations
- Save password securely - Use password manager, never write it down
- Download to encrypted location - Work drive, not Downloads folder
- Verify download - Check file size and integrity
- Delete browser history - Clear download history after saving
Password Management
The ZIP password is critical:
- โ Use password manager - LastPass, 1Password, Bitwarden, etc.
- โ Copy carefully - No typos, no extra spaces
- โ Save immediately - Before closing the download page
- โ Never email - Even to yourself
- โ Never write down - Not on paper, sticky notes, or text files
- โ Never share - Except with authorized colleagues via secure method
Immediate Actions
After downloading:
- Move to secure location - Encrypted folder on work drive
- Extract the ZIP - In the same secure location
- Delete ZIP file - Keep only extracted files
- Verify contents - Check all expected files are present
- Set file permissions - Restrict to only yourself
- Close download link - Clear from browser
Storing Data Securely
Location Requirements
Store downloaded data:
Approved Locations: - โ Encrypted work device hard drive - โ Organization-managed network drive (if encrypted) - โ Organization-approved secure cloud (e.g., Azure with encryption) - โ Secure server with access controls
Prohibited Locations: - โ USB drives or external hard drives - โ Personal cloud storage (Dropbox, Google Drive, iCloud, OneDrive personal) - โ Personal email attachments - โ Unencrypted network shares - โ Shared drives without access controls - โ Personal devices (laptops, phones, tablets) - โ Physical printouts (unless absolutely necessary and secured)
File Organization
Organize files securely:
Folder Structure:
/secure_work_folder/
โโโ census_data/
โโโ 2025/
โ โโโ survey_12345/
โ โ โโโ survey_data.csv
โ โ โโโ metadata.json
โ โ โโโ README.txt
โ โโโ survey_67890/
โโโ archive/
Best Practices: - Use descriptive folder names (but avoid PII in folder names) - Keep different surveys separate - Archive old data separately - Delete entire folder structure when done
File Permissions
Set strict permissions:
On Windows: 1. Right-click file/folder โ Properties โ Security 2. Remove "Everyone" and "Users" groups 3. Keep only your user account 4. Set to "Full Control" for you only
On macOS: 1. Right-click file/folder โ Get Info โ Sharing & Permissions 2. Remove "everyone" and "staff" 3. Keep only your user account 4. Set to "Read & Write" for you only
On Linux:
chmod 600 survey_data.csv # Read/write for owner only
chmod 700 census_data/ # Full access for owner only
Encryption
Layer encryption for maximum security:
Level 1: Full Disk Encryption - Already provided by FileVault/BitLocker - Protects if device is stolen
Level 2: Folder Encryption - Use VeraCrypt or similar to create encrypted container - Protects even if device is accessed while running
Level 3: File Encryption - CSV files can be encrypted with tools like GPG - Protects if file is copied elsewhere
Recommended: At minimum, use Levels 1 and 2.
Using Data Securely
Working with Data
When analyzing data:
- โ Close door/curtains - Prevent shoulder surfing
- โ Privacy screen filter - On your monitor
- โ Lock screen - When leaving desk, even briefly
- โ Minimize windows - When not actively using
- โ Use secure viewer - Excel/R/Python with data at rest encryption
- โ Never screen share - Without ensuring no sensitive data visible
- โ Never present - With raw data on screen in public spaces
Sharing Within Your Organization
If you must share data with colleagues:
Approved Methods: - โ Secure file share (organization-approved) - โ Encrypted email (if organization supports it) - โ Hand delivery on encrypted USB (if policy allows) - โ Through CheckTick itself (add them as data custodian)
Prohibited Methods: - โ Unencrypted email - โ Personal email (Gmail, Yahoo, etc.) - โ Cloud sharing links (Dropbox, Google Drive, WeTransfer, etc.) - โ Instant messaging (Slack, Teams, WhatsApp, etc.) - โ Social media - โ Physical printouts left unsecured
Before Sharing: 1. Verify recipient has legitimate need 2. Confirm they have appropriate permissions 3. Use password-protected ZIP (new password, shared separately) 4. Notify via separate channel (e.g., phone call) 5. Log the share in your own records
Sharing Outside Your Organization
Generally prohibited without specific approval.
If absolutely necessary: 1. Get written approval from organization owner 2. Ensure data sharing agreement is signed 3. Anonymize/pseudonymize data if possible 4. Use secure transfer method 5. Log the transfer 6. Audit recipient's security practices
Deleting Data Securely
When to Delete
Delete data when:
- โ Analysis is complete
- โ Report is published
- โ No longer needed for stated purpose
- โ Retention period expires
- โ Participant requests deletion (right to erasure)
- โ You leave the organization
- โ Project is cancelled
Don't keep data "just in case" - This violates data minimization principles.
Secure Deletion Methods
Simple Delete (Not Sufficient): - Moving to Trash/Recycle Bin does not delete - Standard "Empty Trash" can be recovered - Not acceptable for sensitive data
Secure File Deletion:
On Windows:
- Use SDelete from Microsoft Sysinternals
- Or: cipher /w:C:\folder (built-in)
On macOS:
- Use srm command (if available)
- Or: Disk Utility โ Erase Free Space โ "Most Secure"
On Linux:
- Use shred -vfz -n 10 survey_data.csv
- Or: wipe -rfq census_data/
In Python (for programmatic deletion):
import os
import random
def secure_delete(file_path, passes=7):
with open(file_path, "ba+") as f:
length = f.tell()
for _ in range(passes):
f.seek(0)
f.write(os.urandom(length))
os.remove(file_path)
Verify Deletion
After secure deletion:
- Check Trash/Recycle Bin - Should be empty
- Search for file - Should not be found
- Check backups - Ensure backups are also purged (if you control them)
- Document deletion - Log date and method in your records
Cloud Storage Deletion
If data was stored in cloud:
- Delete from cloud storage
- Empty cloud trash/recycle bin
- Check "version history" - Delete all versions
- Verify deletion in cloud provider's audit log
- Contact provider if permanent deletion needed (some providers retain deleted data)
Data Breach Response
What Counts as a Breach?
A data breach includes:
- Unauthorized access to data
- Accidental email to wrong person
- Lost or stolen device containing data
- Ransomware/malware infection on device with data
- Unauthorized copying or sharing
- Data left unattended in public space
- Improper disposal (e.g., not securely deleted)
Even small breaches must be reported.
Immediate Actions (Within Minutes)
If you suspect a breach:
- Stop - Don't make it worse (e.g., don't forward the email again)
- Contain - Disconnect device from network if infected
- Preserve evidence - Don't delete logs or emails
- Notify immediately - Contact organization owner and Data Protection Officer
Call, don't email - Breaches are urgent.
Reporting Requirements
Within 1 hour: - Notify your organization owner - Notify Data Protection Officer (if your organization has one) - Notify IT security team
Within 24 hours: - Provide written incident report: - What happened - When it happened - What data was affected (how many records, what type) - Who may have accessed the data - What you've done to contain it
Within 72 hours (if required by law): - Your organization must report to regulatory authority (ICO in UK, etc.) - You must cooperate fully with investigation
What NOT to Do
During a breach:
- โ Don't hide it - Covering up makes legal consequences worse
- โ Don't try to "fix" it yourself - You may destroy evidence
- โ Don't contact affected individuals - Organization will handle this
- โ Don't discuss publicly - Including social media
- โ Don't delete anything - Even if you think it helps
Consequences
Data breaches can result in:
- Personal liability - Fines up to ยฃ17 million or 4% of organizational turnover (GDPR)
- Disciplinary action - Up to and including termination
- Criminal prosecution - In serious cases
- Professional sanctions - Loss of licenses/certifications
- Civil lawsuits - From affected individuals
- Reputational damage - Both personal and organizational
This is serious. Follow security practices carefully.
Security Checklist
Daily Practices
- [ ] Lock screen when leaving desk (even briefly)
- [ ] Close data files when not actively using
- [ ] Use privacy screen on monitor
- [ ] Keep work area clear of printouts
- [ ] Shut down or lock computer at end of day
Weekly Practices
- [ ] Check for software updates (OS, antivirus, etc.)
- [ ] Review who has access to shared files
- [ ] Clean up old data no longer needed
- [ ] Verify backups are encrypted
- [ ] Review password manager for weak passwords
Monthly Practices
- [ ] Review all downloaded data - still needed?
- [ ] Securely delete old data
- [ ] Check retention periods in CheckTick
- [ ] Audit file permissions
- [ ] Review organizational security policies
Getting Help
Security Questions
For questions about: - Security best practices โ Contact IT security team - Data protection law โ Contact Data Protection Officer - Organizational policy โ Contact organization owner - CheckTick security features โ See Data Policy
Reporting Issues
Report immediately if: - You suspect a breach - You receive suspicious emails about CheckTick - You notice unauthorized access to data - You're unsure if something is a security issue
Contact: - Organization owner: [Set in organization settings] - Data Protection Officer: [Set in organization settings] - IT Security: [Your organization's IT security contact]
Emergency Contacts
Outside Business Hours: - Critical breach: Call organization emergency number - Device lost/stolen: Call IT security hotline - Ransomware: Disconnect device, call IT security
Training and Awareness
Required Training
Before downloading data, ensure you have completed:
- [ ] Data protection awareness training
- [ ] Information security training
- [ ] Your organization's data handling training
- [ ] CheckTick-specific training (if provided)
Ongoing Learning
Stay informed about:
- Changes to data protection laws
- New security threats (phishing, ransomware, etc.)
- Organizational policy updates
- CheckTick feature updates
Testing Your Knowledge
Regularly test yourself:
- Would you recognize a phishing email?
- Do you know how to report a breach?
- Can you securely delete a file?
- Do you understand your legal obligations?
Legal and Compliance
GDPR Obligations
Under GDPR, you must:
- Lawful basis - Have legal grounds for processing (usually "legitimate interest" or "consent")
- Data minimization - Only download data you need
- Purpose limitation - Use data only for stated purpose
- Accuracy - Ensure data is correct
- Storage limitation - Delete when no longer needed
- Integrity and confidentiality - Keep data secure (this guide)
- Accountability - Document your compliance
UK Data Protection Act 2018
Additional UK requirements:
- Comply with Data Protection Principles
- Respect individual rights (access, rectification, erasure)
- Report breaches to ICO within 72 hours (if required)
- Appoint Data Protection Officer (if required)
NHS Data Security and Protection Toolkit
If handling NHS data:
- Complete annual DSP Toolkit assessment
- Meet all mandatory standards
- Implement role-based access control
- Audit all data access
- Encrypt data at rest and in transit
Caldicott Principles
For health and social care data:
- Justify purpose - Legitimate basis for using confidential information
- Don't use unless absolutely necessary
- Use minimum necessary
- Access on strict need-to-know basis
- Everyone must understand their responsibilities
- Understand and comply with the law
- Duty to share information can be as important as duty to protect confidentiality
Related Guides
- Data Governance Overview - Understanding data governance
- Data Export Guide - How to download data
- Data Retention Policy - How long data is kept
- Data Policy - Formal data protection policy
Remember
Security is not just about technology - it's about behavior.
- Be vigilant
- Think before you click
- When in doubt, ask
- Report incidents immediately
- You are responsible for protecting the data you download
If you can't follow these security practices, don't download the data.