Meeting title: WG Data Security and Trust Meeting
Please give a short introduction describing the activities and the scope of the group
The exchange of information is based on a very fundamental concept: mutual trust. Trust is difficult to establish and easy to lose. In order to be able to trust each other, research facilities, companies and institutions need to agree on and ensure minimum data protection standards.
This requires a verifiable layer of trustworthiness, which goes beyond paying lip service. Only if the partners can agree on data authenticity and integrity standards, only if they can show that the privacy of sensitive data meets the policy needs of the data owners and if access can be granted and revoked based on valid criteria, trustworthy data exchange is possible.
This proposed working group aims at providing a common arena for understanding and harmonizing various notions of data security and trust across research domains, which should facilitate common agreements on standards, best practices and policies. This, in turn, should allow access to, and/or exchange, of sensitive data without disclosure to unauthorised parties and according to clearly defined and verifiable protocols.
The group started as a BoF on the 6th Plenary in Paris, and has since prepared the case statement.
Please provide additional links to informative material related to your group i.e. group page, Case statement, working documents etc
Group page: https://rd-alliance.org/groups/working-group-data-security-and-trust.html
Case statement: https://rd-alliance.org/group/working-group-data-security-and-trust/case...
Please list the meeting objectives
The objectives of the meeting are
- Discuss and review the current case statement
- Identify partners to extend the case statement by new use cases
- Extend the membership scope of the group to new domains and locations
- Present the results from a review on current best practices, recommendations and standards
- Prepare the gap analysis
- Decision on WG group chairs
Meeting agenda
- Welcome and introduction of the WGDST, Round of introductions (participants)
- Brief review of the existing use cases and case statement
- New use cases from participants
- Presentation of the results of the review on best practices, recommendations and standards
- Preparation of gap analysis
- Wrap up and definition of next steps
Audience: Please specify who is your target audience and how they should prepare for the meeting
- Researchers working with data that data is difficult to share with others, e.g. because of privacy concern, while the researchers would have an interest to share this data with their peers to improve collaboration and scientific progress on the topic.
- Experts in the domains of security and privacy, legality, etc. to identify technical and regulation-conforming solutions for data sharing.
Group chair serving as contact person: Rudolf Mayer