Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. 'Research governance’ as a foundational area.
  2. ‘Users’ are (human) end-users who participate in a collaboration, are identified via
  3. ‘identity’‘Authentication Sources’, i.e. external identity providers and the identity layer of the BPA, to be granted access by
  4. ‘collaboration management’‘Collaboration Management’, to
  5. ‘infrastructure integration and service providers’‘Service and Infrastructure Providers’; in the BPA the infrastructure integration components, site-local integration components, and the actual service providers.

...

Scroll ImageMap
viewSize800.0
makeResponsivetrue
imgWidth1410.0
imgFilenameP3DK-arrowed-authNSources.drawio.png
areasData{"areas":[{"shapeType":"rect","coords":"713,198,130,60","title":"WISE Baseline AUP guidance","pageRefIndex":0,"linkTarget":"_blank"},{"shapeType":"rect","coords":"1075,200,132,62","title":"WISE Baseline AUP guidance","pageRefIndex":0,"linkTarget":"_blank"},{"shapeType":"rect","coords":"711,285,133,66","title":"Attribute authorities and membership services guidance","pageRefIndex":1,"linkTarget":"_blank"},{"shapeType":"rect","coords":"711,119,130,66","title":"Manage your community members","pageRefIndex":2,"linkTarget":"_blank"},{"shapeType":"rect","coords":"711,370,135,66","title":"Operational Security for your services","pageRefIndex":3,"linkTarget":"_blank"},{"shapeType":"rect","coords":"1072,368,130,71","title":"Security for your services","pageRefIndex":3,"linkTarget":"_blank"},{"shapeType":"rect","coords":"1253,370,130,60","title":"Incident Response collaboration","pageRefIndex":4,"linkTarget":"_blank"},{"shapeType":"rect","coords":"1238,117,133,67","title":"Service Levels and data classification","pageRefIndex":5,"linkTarget":"_blank"},{"shapeType":"rect","coords":"874,287,132,60","title":"Incident response procedure","pageRefIndex":6,"linkTarget":"_blank"},{"shapeType":"rect","coords":"872,375,132,55","title":"Sirtfi trust framework","pageRefIndex":4,"linkTarget":"_blank"},{"shapeType":"rect","coords":"711,451,132,66","title":"Privacy (for collaborations)","pageRefIndex":7,"linkTarget":"_blank"},{"shapeType":"rect","coords":"870,447,135,71","title":"Notice Management presentation (for collaborations)","pageRefIndex":8,"linkTarget":"_blank"},{"shapeType":"rect","coords":"874,532,128,54","title":"Privacy notice templates","linkTarget":"_blank","externalLink":"/spaces/AARC/pages/1214906505/The+REFEDS+Data+Protection+Code+of+Conduct#TheREFEDSDataProtectionCodeofConduct-Templatesofprivacynotices"},{"shapeType":"rect","coords":"283,198,124,60","title":"WISE AUP Purpose of Collaboration","pageRefIndex":0,"linkTarget":"_blank"},{"shapeType":"rect","coords":"1245,532,133,58","title":"Privacy notice templates","linkTarget":"_blank","externalLink":"/spaces/AARC/pages/1214906505/The+REFEDS+Data+Protection+Code+of+Conduct#TheREFEDSDataProtectionCodeofConduct-Templatesofprivacynotices"},{"shapeType":"rect","coords":"1064,453,139,60","title":"Data Protection code of conduct","pageRefIndex":7,"linkTarget":"_blank"},{"shapeType":"rect","coords":"716,611,132,64","title":"Requirements on Acceptable Assurance","pageRefIndex":9,"linkTarget":"_blank"},{"shapeType":"rect","coords":"1076,610,132,63","title":"Assurance requirements and risk appetite","pageRefIndex":9,"linkTarget":"_blank"},{"shapeType":"rect","coords":"59,111,128,60","title":"Rules of Participation","pageRefIndex":10,"linkTarget":"_blank"},{"shapeType":"rect","coords":"57,203,130,52","title":"Identification of primary assets","pageRefIndex":11,"linkTarget":"_blank"},{"shapeType":"rect","coords":"61,286,128,64","title":"Research Risk Assessment","pageRefIndex":12,"linkTarget":"_blank"},{"shapeType":"rect","coords":"55,368,137,64","title":"Escalation procedure","pageRefIndex":13,"linkTarget":"_blank"},{"shapeType":"rect","coords":"59,451,135,58","title":"Legal and Regulatory Compliance","pageRefIndex":14,"linkTarget":"_blank"},{"shapeType":"rect","coords":"283,454,137,60","title":"Privacy Notice","pageRefIndex":15,"linkTarget":"_blank"},{"shapeType":"rect","coords":"480,451,137,64","title":"REFEDS Data Protection Code of Conduct","pageRefIndex":7,"linkTarget":"_blank"},{"shapeType":"rect","coords":"483,366,137,73","title":"Sirtfi","pageRefIndex":4,"linkTarget":"_blank"},{"shapeType":"rect","coords":"485,285,133,64","title":"Attribute Authority Operational Security","pageRefIndex":1,"linkTarget":"_blank"},{"shapeType":"rect","coords":"485,530,135,64","title":"Institutional AUP and Privacy Notice","pageRefIndex":16,"linkTarget":"_blank"},{"shapeType":"rect","coords":"483,609,133,60","title":"REFEDS Assurance Framework","pageRefIndex":17,"linkTarget":"_blank"},{"shapeType":"rect","coords":"714,526,128,66","title":"Sensitive Data Access policies","pageRefIndex":18,"linkTarget":"_blank"},{"shapeType":"rect","coords":"1068,528,139,60","title":"Data Access Policy Enforcement","pageRefIndex":18,"linkTarget":"_blank"},{"shapeType":"rect","coords":"1246,452,134,62","title":"Notice Management provision","pageRefIndex":19,"linkTarget":"_blank"},{"shapeType":"rect","coords":"1251,283,128,62","title":"Incident Response Procedure","pageRefIndex":6,"linkTarget":"_blank"}]}
pageReferencesWISE AUP-!!!!!-Attribute Authority Operational Security-!!!!!-Membership Management-!!!!!-Security Operational Baseline-!!!!!-SIRTFI-!!!!!-Service Levels and Data Classification (the "IAC" or "CIA" triad)-!!!!!-Incident Response Procedure-!!!!!-The REFEDS Data Protection Code of Conduct-!!!!!-Notice Management (presentation)-!!!!!-Assurance Requirements-!!!!!-Rules of Participation-!!!!!-Identification of Primary Assets-!!!!!-Research Risk Assessment-!!!!!-Escalation Procedure-!!!!!-Legal and Regulatory Compliance-!!!!!-(EEA) Privacy Notice-!!!!!-AUP and Privacy Notices for authentication sourcesAuthentication Sources-!!!!!-REFEDS Assurance Framework-!!!!!-Sensitive Data Access Policies-!!!!!-Notice Management (Provision)
imgHeight750.0
imgContainerPagePolicy Development Kit version 2
alwaysHighlightfalse
dataModelVersion3

...