This section will give an overview of the steps involved in transferring data as part of a data request.
Depending on the data request, the data owner may need to de-identify data in order to protect the privacy and rights of the individuals represented in the data. There are a number of ways to de-identify data, and these are summarized below.
One way to de-identify data is to remove all of the fields that could be used to identify a specific individual from the data. Examples include names, phone numbers, and birthdays. (For more information about confidential data, see the section Document critical data elements.)
Data owners can also choose to aggregate data. This is accomplished by providing counts of specific fields for a dataset. For example, sensitive fields like birthday and address can be converted to age range and zip code in order to provide the counts of each age group living in a specific area.
When aggregating data, it’s important to ensure that groups aren’t split up so much that it’s still possible to identify individuals. For example, if you’re aggregating based on school, test scores, grade, and race and ethnicity, the counts can’t be small enough for someone to identify individual students.
Once the parties have agreed to share data, it’s time to consider the logistics of transferring the data. The method will vary based on the sensitivity of the data.
Data that is open to the public doesn’t require a secure channel for data transfer. Some options that might be suited for file transfers are:
Technology | File size limits | Usage notes |
---|---|---|
Email (ct.gov and po.state.ct.us) | 20MB, 35MB | 35MB but depends on the recipients size limit also, they could have a 20MB limit. |
Microsoft Office 360 OneDrive (ct.gov and po.state.ct.us) | 100GB | |
Approved external device | varies | Ask IT department for more information |
Shared network drive | varies | Ask IT department for more information |
All data that isn’t open to the public should be transferred through secure channels. These data include data governed by HIPAA, FERPA, or state laws and data that are confidential, subject to misuse, or simply not authorized for public consumption due to outstanding approval.
Failure to transfer non-public data securely may result in harm to citizens, lawsuits filed against the responsible government office, and severe professional consequences for the offending employee. It’s important to pay careful attention when sharing non-public data. Secure channels include:
Technology | File size limits | Usage notes |
---|---|---|
Government-approved SFTP service |
|
|
Government-approved Encrypted External Drive | varies |
|
To accelerate secure data transfer, zip and encrypt data files before initiating a data transfer.
To zip a file:
To encrypt a file:
The Department of Administrative Services Bureau of Information Technology Solutions (BITS) offers Executive Branch agencies an Enterprise Secure File Transport (SFT) Service for agencies that need to share sensitive content between other agencies, or business partners in a secure manner.
More information can be found on the DAS website here. The website states that this service offers the following:
Use of our Enterprise Secure File Transport Service has the following conditions:
See Appendix A for a step by step guide to using SFTP.