On this page you will find guidance on who to ask for advice about working with sensitive research data (personal or commercial), encryption of files and folders, storage of research data, transferring research data, disposing of research data and anonymisation.
N.B. This page uses “sensitive data” as an umbrella term. Please refer to the University’s Information Classification Scheme and the Data Protection Act to understand which category your data falls into.
This guide will help to ensure that you manage any commercially sensitive research data securely and, for personal data or special category data, ensure that you adhere to data protection legislation.
We provide a self-paced online training course on Managing Human Participant Research Data (Requires University of Bath login).
The University recognises three levels of data and information in its Information Classification Framework:
In the context of research, the most common reasons for data being Restricted or Highly Restricted include:
Special category personal data (formerly known as sensitive personal data) are defined in the Data Protection Act as those relating to an individual's:
If you are working with commercially sensitive data, personal data or restricted data, you need to take extra precautions to ensure that they can only be viewed by those with permission to do so. These may include encryption or other special measures when storing, transferring and disposing of data.
Encryption is the process of obfuscating data so that only those with the correct decryption key or password are able to read them. The strength of the encryption refers to how difficult it would be for an attacker to decrypt the data without knowing the key in advance, and this depends on the method and the key used. Ensure that you always use strong password for any encrypted files or folders and that you keep the key safe. If you lose the decryption key the data will be unrecoverable even by Computing Services.
Encryption can be applied to folders (the Digital, Data and Technology Group can set up encrypted folders on the X:Drive), to files or to entire devices such as laptops, external drives and USB sticks. You can order an encrypted USB stick (Kingston Data Traveller Locker+ G3) from the IT shop by emailing ITP@bath.ac.uk.
Note: if you need to access files stored in an encrypted folder on the University managed servers (X: or H: Drive) you will need to do so by mapping the drive to your local PC or laptop and accessing the University network via VPN. You will also need VeraCrypt installed on your local PC or laptop. It is not possible to access files stored in encrypted folders on the University system via files.bath or UniApps.
There is more information on encryption on the following webpages:
You can also contact your local IT supporter for more information on encryption.
The following advice relates to your University of Bath file storage options, although before processing, storing or transferring any research data, it is recommended that you check your grant, partner or contractual agreements in case you are obligated to store your research data on a storage option not listed below. However, wherever you store your research data, it must be secure and if you are dealing with personal data, the storage must be compliant with UK Data Protection legislation.
It is possible to restrict access to folders on the X drive and to request for an encrypted folder to be set up by your local IT supporter. If you are working with personal data, or commercially sensitive data, you should consider:
Both the NHS and ESRC require identifiable personal data to be stored in an encrypted folder separately from anonymised or pseudoanonymised study data.
You only need to request that an encrypted folder is set up where the data need to be made inaccessible to system administrators.
When contemplating the use of cloud storage for research and the storage of sensitive data, it is important to differentiate between cloud storage that is enterprise-grade (e.g. provided by an institution/ university account) vs. a non-institutional (personal) account.
While personal accounts for external cloud services such as Dropbox, Google Drive and OneDrive are convenient, they do not comply fully with the University's data policies due to the following issues:
Personal cloud-based storage solutions must not be used for sensitive data.
However, when using cloud storage, the above issues can be addressed via the use of enterprise-grade cloud storage provided for by the university as they are resilient and meet the NCSC’s 14 cloud security principles. Computing Services provide advice on storing information in the cloud.
Files and folders held in cloud storage should have access restricted and passwords applied where appropriate.
If you are working with external research partners and they propose the use of cloud storage, ensure that this storage is enterprise-grade.
If you are working away from the University during your research and the only option is to store sensitive data on an external device, such as a laptop, you should take the following precautions:
Transmission over a standard HTTP or email is not secure, and may be intercepted and read by third parties. Extra precautions need to be taken when transferring personal data between collaborators:
Before getting to the stage of sharing research data, researchers should consider the suitability and potential risks of research data transfer to collaborators and whether the appropriate safety measures are in place before any agreements are signed. It is recommended that you understand how to protect you and your research and are aware of the University's Export Control Policy.
If you are sharing identifiable or pseudonymised (containing a participant identifier that can be used to re-identify the participant) between collaborators there may need to have a data transfer agreement or data sharing agreement between the data controller and the institution that the data are being transferred to. If the University of Bath has been identified as data controller in a project then you should contact the Data Protection team to determine whether a data transfer agreement is needed.
In order to comply with the Data Protection Act you should avoid transferring personal data (such as audio files) or special category personal data (such as video files) to a transcription service that is based outside the European Economic Area (EEA).
Transferring identifiable personal data outside the EEA may result in a breach of the Data Protection Act. Therefore, personal data that has not been fully anonymised must not be transferred out of the European Economic Area (EEA). Transfer of personal data (securely) is permitted for the following countries: Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Liechtenstein, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden and the United Kingdom.
Transfers of data to Andorra, Argentina, Guernsey, Isle of Man, Israel, Jersey, New Zealand, Switzerland and Uruguay are considered by the EU Commission to be 'adequate' in terms of their data protection. If you are unsure about whether or not you can transfer identifiable personal data please contact the Data Protection team for advice.
If you are collecting your data abroad in a country outside the EEA you should ensure that you do the following:
You should should ensure that you dispose of sensitive data (commercial or personal) securely and you may need to provide a certificate of data destruction to comply with the terms of some third party data providers.
The Digital, Data and Technology Group can provide assistance with deletion tools to ensure the secure erasure of data from computers and other digital storage.
Digital recording equipment loaned from the Audio Visual Unit undergoes a hard reformat once it is returned. The data on the memory card is deleted and overwritten, and the table of contents removed.
IT equipment is disposed of by contacting Estates. Human Resources also provide guidance on the disposal of computers and media storage devices (PDF) that contain sensitive information.
Paper-based sensitive data (commercial or personal) can be disposed of using the University's confidential paper waste disposal service. This service can also advise on the secure disposal of CDs, DVDs, and other media.
If you fully anonymise personal data they are no longer considered to be personal data, and therefore do not fall under Data Protection legislation. However, fully anonymising data can be complex because you need to consider the risk of re-identification of data subjects - not just from the dataset itself, but from other available data, including data sources that may be available online.
One test that can be used to think about whether your data can be, or have been, anonymised is the 'motivated intruder' test. According to the Information Commissioners Office guidance, the 'motivated intruder' ' is taken to be a person who starts without any prior knowledge but who wishes to identify the individual from whose personal data the anonymised data has been derived'. The motivated intruder would be assumed to 'be reasonably competent, has access to resources such as the internet, libraries, and all public documents, and would employ investigative techniques such as making enquires of people who may have additional knowledge of the identity of the data subject or advertising for anyone with information to come forward'.
The UK Data Service provides extensive and detailed guidance on anonymising quantitative and qualitative data. The table below summarises processes for anonymising quantitative and qualitative data from the UK Data Service guidance.
Quantitative data | Qualitative data |
Remove direct identifiers | Don't collect disclosive information unless necessary |
Aggregate or reduce the precision of a variable | Plan anonymisation at time of transcription |
Generalise the meaning of a detailed text variable | Use pseudonyms or replacements that are consistent throughout the project |
Restrict the upper and lower ranges of a continuous variable | Use 'search and replace' techniques with caution as they miss typos |
Anonymise relational data | Identify replacements in text clearly |
Anonymise geo-referenced data | Keep unedited versions for use within the research team |
Create an anonymisation log | Create an anonymisation log |
Audio-visual data are highly labour intensive and expensive - consider if you really need to keep them |
If you do not think that you can confidently anonymise data do not make it openly available to the public. Instead, share it using access restrictions.