Duke University
Statement on Data Governance and Protection
Duke faculty, staff, students, patients, collaborators and research subjects entrust us with their personal and confidential information. We balance the free exchange of information with the need to protect sensitive or regulated information and to ensure information is available for authorized use. Data is a valuable strategic asset and we must demonstrate responsible stewardship for the data we access and create to maintain its security, confidentiality, integrity and availability. Duke is committed to fairly and appropriately managing and safeguarding information and data collected, used and maintained in support of its academic, research and clinical missions.
Duke uses institutional data to inform better decisions and improve institutional insight. Duke also encourages appropriate sharing of its institutional data within our community, consistent with the sensitivity, privacy landscape, and data classification. Data governance and security practices promote evaluation of requests and oversight of access, use, confidentiality, aggregation, appropriate-identification or other data transformations to shared data as appropriate. We keep information confidential and use it only with permission and for authorized purposes (Values in Action: Data Protection, Privacy and Confidentiality).
We are committed to ensuring sound data governance, stewardship and diligent protection, including responsible and ethical use of information assets generated by or entrusted to Duke in accordance with regulatory requirements. Data governance and protection practices guide responsibility and accountability as well as opportunity and efficiency, and strengthen the framework for stewardship and trust.
This Statement on Data Governance and Protection (the Data Statement) is intended to provide an overview of Duke’s data protection practices. It applies to activities conducted by Duke University and its wholly owned and affiliated entities (supplemental information for clinical and protected health information is described below).
Clinical and Protected Health Information
We are committed to safeguarding Protected Health Information (PHI) by adhering to the standards of data security, privacy, and confidentiality in our use and disclosure of PHI and any data derived from PHI, including de-identified data (collectively PHI). Duke Health follows a comprehensive, institutional approach to govern and protect data, ensure patient privacy, provide quality care, and conduct clinical research. We adhere to the Health Insurance Portability and Accountability Act (HIPAA) and other applicable federal and state laws.
Duke Health publishes supplemental policies and guidance specific to the clinical care environment and PHI: Duke Health’s Commitment to Data Governance and Protection and Duke Health Enterprise Notice of Privacy Practices.
Duke’s data governance is a system of institutionally managed and provisioned computing environments coupled with federated decision rights and accountabilities for data collection, storage, access, processing and use. Policies and standards, including a Data Security Policy and Data Classification Standard, have been established to communicate Duke’s data protection expectations and enable accountability. Duke employs an oversight committee structure for information security, technology priorities, privacy, compliance and incident response. Additionally, Duke’s system of controls for data quality, stewardship, management and compliance includes processes and technology to secure data throughout its lifecycle and addresses: data confidentiality and privacy, data generation and collection, data use and security, data sharing and disclosure, data retention and destruction. Key security guidelines help drive expectations for identity management, endpoint protection, data import/export, data analytics and decision support tools, data storage and third-party risk management. These policies and controls are reinforced through education and awareness.
Categories of data collected, stored and used at Duke include:
- Institutional – (1) any information acquired, created or generated by Duke in support of its mission or business activities, decisions or services; and (2) information collected or generated to meet regulatory, contractual or legal obligations
- Research – any information collected, stored, generated or used in the course of academic, scientific and other non-clinical research activities
- Clinical – personal health information (PHI) and directly related information and images collected, generated, created, stored, accessed or used in the provision of clinical care, patient communications and records, conduct of medical research and clinical trials, and other activities directly related to clinical care
- Publicly Available – information and data that is accessible to the public without restrictions, credentials or compensation payment, but may have usage guidelines imposed (e.g., citations, permission, acknowledgement, etc.)
We are all data stewards and responsible for ensuring we can trust data and have confidence in its reliability to support effective academic, research, patient care and operational decision-making. Data-related work is performed according to policies and procedures, and in compliance with applicable laws and regulations. We use data prudently and ethically. All members of the Duke community are expected to know the classification of the data they’re handling and to understand the associated recommended practices (Data Classification Standard, Duke Services and Data Classification).
Various federal and state laws impose obligations on Duke, including, but not limited to NSPM-33, HIPAA, FERPA, FISMA, the NC Identity Theft Protection Act and PCI-DSS. Grants and contracts may also stipulate requirements for the protection and preservation of associated data. It is important that all data are reasonably and appropriately managed to maintain data integrity, availability, and when required, confidentiality to protect against accidental or unauthorized access, modification, disclosure and destruction. Duke’s Data Security Policy supports and reinforces our regulatory and contractual obligations.
Duke faculty, staff and students may have access to confidential information. Confidential Information must be safeguarded and treated with respect and care by any workforce member authorized to have access to it. Duke is committed to fairly and appropriately managing and safeguarding the information collected, used and maintained in support of its employment practices and its academic, research and clinical missions and to transparency regarding our data management practices. Duke respects data integrity and protection for all its stakeholders, including as represented by personally identifying information about each stakeholder, and takes seriously its responsibility to protect individuals’ privacy in balance with meeting its legal, policy and administrative obligations. We seek to minimize the information we collect, limit access to that information and apply appropriate security measures to protect against loss, improper modification and disclosure.
We generate and collect data for legitimate and specified purposes related to our academic, healthcare, research and business activities. This valuable data includes intellectual property, proprietary information and sensitive or private data about students, faculty, staff, patients and research participants. We limit the data collected, used and stored to only that which is needed to meet the intended purpose.
We only use data for its authorized and intended purpose. We employ robust technical and organizational measures to safeguard data against unauthorized access, disclosure, alteration, and destruction. These measures are grounded in trusted frameworks and guidelines, such as CIS Critical Security Controls and NIST 800-171. We are aware of and apply Duke’s security policies and standards related to data access and handling according to its classification (Data Classification Standard), including use of passwords, approved tools, encryption to secure access and storage, and only store data in approved computing environments (Duke Services and Data Classification), such as those designated for research or sensitive data. We take personal responsibility for applying fundamental security practices, such as physically securing laptops and other digital media devices, maintaining the privacy of passwords and not sharing credentials, locking computer screens when not in use, and being aware and taking appropriate action when receiving suspicious emails or other phishing attempts.
We balance the free exchange of information with the need to protect sensitive or regulated information and to ensure information is available for use. We share data within the Duke community for legitimate purposes, such as academic administration, decision support and healthcare provision. Additionally, we share data with external partners, collaborators, or regulatory bodies as required by law or for research collaboration, always ensuring appropriate safeguards are in place to protect the data, including the use of approved tools based on the classification of the data (Duke Services and Data Classification). Data is shared responsibly according to Duke policy and in compliance with contractual commitments using approved tools and methods.
We only retain data for as long as necessary to fulfill the purposes for which it was collected or as required by applicable laws and regulations. We understand and abide by Duke and contractual data retention and destruction requirements, for data generated in-house and provided by third parties (Records Retention Guidelines).
Your Duke NetID is your unique electronic identity. Your NetID and password should not be shared. Any authentication to services offered to the Duke community or making use of non-public Duke data should require use of an approved single sign-on (SSO) authentication method (Authentication to Duke Services). This helps ensure that Duke’s security offices can help monitor traffic for indicators of compromise and prevent or respond to any security issue as quickly as possible. We adhere to parameters and guidance provided in Duke’s password policy and immediately change our password if it is believed to have become compromised (Secure Access Guide). We should not reveal a password to an IT support technician or any other individual, even though they may claim to work for the IT service (over the phone or in person). If, in our professional judgment, it is necessary to share a password with an IT support technician or any other individual, the password must be changed as soon as possible thereafter. Once shared, a password is considered compromised and must be changed immediately (Duke Acceptable Use Policy).
Security requirements have been defined and applied to all Duke-owned laptops, desktops, and servers, including virtual machines. Guest laptops, desktops, and servers also meet defined endpoint security requirements to connect to the Duke network or store Duke data, including use of antivirus software, a supported operating system and up-to-date patching. We coordinate with support teams to address endpoint security issues, apply updates when notified that they are available, respond promptly to requests from support teams, and turn on devices regularly so that they can receive updates and communicate with security tools (Endpoint Device Security and Quarantining Practices). Any IT administrators with access to endpoint security tools, including the IT Security Office, are required to adhere to the Duke Acceptable Use Policy, particularly those statements regarding the expectation of privacy for the Duke community. IT administrators may not use their access to look at content on the systems they maintain, except when defined conditions are met, and use of the security management tools is audited (Endpoint Management Operational and Privacy Protocols).
We are careful in how we download and transmit data to protect its confidentiality, integrity and our environment. We only share data with authorized individuals who have a valid business need to receive and view it. Approved tools and services are used to facilitate the secure sharing and receiving of data according to the classification of the data (Duke Services and Data Classification). Heightened vigilance is applied when sharing data using medium (e.g., email, web-based portal, file drop, hard copy shipment) that is appropriate for the type of data. Ensure files and data do not contain viruses or other threats prior to introducing them to the Duke environment.
Duke uses advanced technologies to enhance our data analytics capabilities. Duke encourages the appropriate, responsible and ethical use of legitimate data analytics and decision support tools to support comprehensive research and analysis, including artificial intelligence (AI) technologies such as large language models and generative AI. Duke’s stance regarding use of decision support and analytical technologies and remain informed of changes to their acceptable use (Use of AI Tools, Generative AI and Teaching at Duke). Avoid using Duke credentials/email address and NetID password to access tools that open data sources and avoid submitting sensitive personal or Duke data to the service, and verify the accuracy and validity of data received from third-party tools prior to entering the data into Duke systems. Only data classified as “Public” per Duke’s Data Classification Standard is submitted to publicly available AI tools. When possible, we use Duke hosted platforms and ensure data entered in public facing systems does not pose privacy, confidentiality or proprietary data risks.
Duke approves authorized third-party applications, services, computing environments (including cloud) and storage solutions that access, use, store, or transmit Duke data based on the sensitivity and classification of the data (Storage, Backups and Hosting). Duke faculty, students and staff should be aware that there may be institutional, legal, regulatory and contractual obligations that require the use of specific storage options. Access to data locations is limited to authorized or approved individuals and immediately removed when no longer needed. Institutional approval is obtained when providing public or broad access to data (Duke Services and Data Classification).
We utilize approved procurement channels and follow existing protocols when engaging third parties, including consultation with the IT Security Office prior to sharing any data with a vendor. A detailed security assessment of the vendor’s environment is performed using industry standard tools prior to sharing data. Vendors receiving Duke data must meet and maintain compliance with Duke’s security requirements, including terms contained in additional contractual provisions, when required. Data use and sharing agreements must be authorized by Duke Office of Counsel prior to sharing Duke data with third parties for research purposes to outline acceptable terms of use and expected safeguards. When a Duke employee or student leaves the University, their account information (such as email electronic files, voice mail, and other data) is not made available to third parties, except in rare cases as defined in the Duke Acceptable Use Policy (Account or Data Access Policy).
Duke’s central IT organizations provide information on data protection best practices and emerging threats. Policies, standards and guidelines are communicated to all new hires. Additional materials and educational requirements have been developed for individuals with access to sensitive data in protected enclaves within Duke’s network (Security Awareness and Training Service Guide). Awareness activities, such as simulated email phishing exercises, are provided throughout the year to maintain security awareness and vigilance. As stewards of sound data protection practices, we understand and apply the teachings communicated within these educational campaigns and take personal responsibility for remaining informed of evolving threats and recommendations.
Key Contacts
- Duke University Chief Information Security Officer (CISO)
- Duke University Privacy Officer
- Duke Scientific Integrity Officer
- Duke University Compliance Officer
- Duke University Health System (Duke Health) Compliance Officer
- Duke University Health System (Duke Health) Privacy Officer
- Duke University Health System (Duke Health) CISO
- Duke Speak-up Program (for confidential or anonymous concerns)
- Office of Counsel
Relevant Policies and Standards
- Use of AI Tools
- Data Security Policy
- Secure Access Guide
- Confidentiality Policy
- Duke Acceptable Use Policy
- Data Classification Standard
- Records Retention Guidelines
- Storage, Backups and Hosting
- Account or Data Access Policy
- Authentication to Duke Services
- Duke University Privacy Statement
- Generative AI and Teaching at Duke
- Duke Services and Data Classification
- Security Awareness and Training Service Guide
- Duke Health’s Commitment to Data Governance and Protection
- Endpoint Device Security and Quarantining Practices
- Endpoint Management Operational and Privacy Protocols
- Values in Action: Data Protection, Privacy and Confidentiality
Definitions
Clinical Data: personal health information (PHI) and directly related information and images collected, generated, created, stored, accessed or used in the provision of clinical care, patient communications and records, conduct of medical research and clinical trials, and other activities directly related to clinical care
Data: Any items of information that are received, created, collected, maintained, accessed, provided by a third party (e.g., as part of a sponsored research project or other collaboration) and used, transmitted or disclosed for the fulfillment of the mission of Duke, whether in electronic, paper or other format (Data Security Policy).
Data Availability: Data is accessible to appropriate personnel based on roles and responsibilities, at the right time.
Data Classification: Tiers that assist in determining how data must be controlled, handled or managed; currently Duke’s classifications are Sensitive, Restricted and Public.
Data Custodian: The individual who physically or directly handles the storage and security of data.
Data Integrity: Data that complies with all rules regarding definitions, relationships, lineage, and heritage. In data movement, data that is not changed unexpectedly through transmission between systems.
Data Manager: The individual who is responsible for maintaining security controls to protect data established under law and by this and any other Duke requirements (Data Security Policy).
Data Quality: The degree to which data is accurate, complete, timely, consistent with all requirements and business rules, and relevant for a given use, fit for purpose.
Data Steward: The individual who has accountability and authority to make decisions about a specific set of data and is responsible for defining the access and protection rules for a specific set of data (Data Security Policy).
Institutional Data: Data that the university collects or generates in support of our mission and academic or business purposes, and information collected or generated to meet regulatory, contractual or legal obligations, excluding data of Duke University Health System (DUHS) and other related Duke entities.
Intellectual Property: Data that pertains to creative works, branding, inventions, confidential information or 3rd party relationships; this may be generated by Duke faculty, staff or students, or entrusted to Duke through contractual data sharing relationships.
Publicly Available Data: information and data that is accessible to the public without restrictions, credentials or compensation payment, but may have usage guidelines imposed.
Research Data: any information collected, stored, generated or used in the course of academic, scientific and other non-clinical research activities
User: The individual who creates, accesses, processes, enters, reads, deletes or otherwise "uses" data (Data Security Policy).