PromptsVault AI is thinking...
Searching the best prompts from our community
Searching the best prompts from our community
Prompts matching the #data-protection tag
Navigate institutional review board approval process. IRB submission components: 1. Research protocol: clear description of purpose, methods, participants, risks/benefits. 2. Informed consent form: written in lay language (8th grade level), includes right to withdraw, confidentiality procedures. 3. Recruitment materials: flyers, emails, scripts for participant recruitment. 4. Data management plan: how data will be collected, stored, de-identified, destroyed. 5. Risk assessment: minimal risk vs. greater than minimal risk determination. Common ethical considerations: 1. Vulnerable populations (children, prisoners, pregnant women) require additional protections. 2. Deception studies need debriefing procedures. 3. Online research needs privacy protections. 4. Data sharing requires participant consent. Expedited review: minimal risk studies using established procedures. Full board review: greater than minimal risk or sensitive topics. Timeline: allow 4-8 weeks for initial review.
Build security into product development lifecycle (secure SDLC). Security requirements: 1. Authentication: multi-factor authentication, password policies. 2. Authorization: role-based access control, principle of least privilege. 3. Data protection: encryption at rest/transit, tokenization of sensitive data. 4. Input validation: prevent injection attacks, sanitize user inputs. 5. Session management: secure cookies, session timeouts. Development practices: 1. Threat modeling: identify potential attack vectors early. 2. Secure coding standards: OWASP guidelines, code reviews. 3. Dependency scanning: monitor third-party libraries for vulnerabilities. 4. Penetration testing: regular security assessments. 5. Security training: developer education on common vulnerabilities. Monitoring and response: 1. Security information and event management (SIEM). 2. Intrusion detection systems. 3. Incident response plan: defined procedures for breaches. 4. Regular security audits and compliance checks. Tools: Snyk for dependency scanning, Veracode for static analysis, bug bounty programs for ongoing testing.
Implement comprehensive backup and disaster recovery automation for business continuity and data protection. Backup strategies: 1. 3-2-1 rule: 3 copies of data, 2 different media types, 1 offsite location. 2. Recovery objectives: RTO (Recovery Time Objective) <4 hours, RPO (Recovery Point Objective) <1 hour. 3. Backup types: full (weekly), incremental (daily), differential options based on data change rate. Automated backup systems: 1. Database backups: automated SQL dumps, point-in-time recovery, transaction log backups. 2. File system backups: rsync, duplicity for encrypted backups, snapshot-based backups. 3. Application data: configuration backups, state snapshots, user data preservation. Cloud backup solutions: 1. AWS Backup: cross-service backup management, automated backup policies, compliance reporting. 2. Azure Backup: VM backups, SQL Server backup, file/folder level recovery. 3. Google Cloud Backup: automated VM snapshots, database backup scheduling. Disaster recovery planning: 1. Failover automation: DNS switching, load balancer reconfiguration, database promotion. 2. Recovery testing: monthly DR drills, automated failover testing, recovery time validation. 3. Documentation: runbooks, contact lists, escalation procedures, vendor contacts. Data validation: 1. Backup verification: restore testing, data integrity checks, backup completion monitoring. 2. Compliance: retention policies (7 years for financial data), encryption requirements. Monitoring and alerting: backup success/failure notifications, storage capacity monitoring, restore time tracking, compliance dashboard with audit trails.
Handle data privacy requests. Process: 1. Acknowledge request within required timeframe. 2. Verify customer identity securely. 3. Explain what data you hold. 4. Provide data export in readable format. 5. Process deletion requests per policy. 6. Confirm completion of request. 7. Explain data retention requirements. 8. Document all requests for compliance. Follow GDPR/CCPA requirements strictly.