Methods of data transfer

When collaborating with colleagues, we handle the sharing and transfer of data files on a daily basis. The options for the transfer of data depend on the scope of the transferred data.

1. Sending data as an e-mail attachment

Small-scale data (typically office application files, etc.) of several MBs are often transferred by e-mail (depending on the type of email client, files up to 10MB can be transferred in one message


What to watch out for...

When transferring confidential data, it is always necessary to encrypt the files. Emailing sensitive data is not recommended even when using encryption. Emails are now commonly delivered to various mobile devices (phones, tablets, watches, etc.) with different levels of security, so the risk of disclosure is high when transferring unencrypted files.

2. Use of flash disks and USB drives

Today, very cheap flash or USB drives are used to transfer often relatively large amounts of data. Hence, when using encryption, there can be no objection to the use of this method, provided that the administration of end PCs allows them to be connected (many companies prohibit the use of USB ports for this purpose in order to protect data from being stolen). However, one must always pay attention to the secure transmission of the encryption key and realize that this method of transmission does not allow for verification of the data recipient.


What to watch out for...

As mentioned above, when using these portable media, it is essential to ensure the encryption of the stored data for security reasons. One must keep in mind the high risk of easily losing the media, i.e. the loss of stored data or their possible misuse.

3. Use of storage for one-time or time-restricted transfer of data

There are a number of web portals that allow you to conveniently upload even large amounts of data in order to provide them to or download them to other people (the identity of the persons authorized to download is determined by entering an e-mail address). These portals should also be seen as temporary data repositories, and one should keep in mind the above-mentioned aspects of the specific services.

a) CESNET “FileSender” service operated by CESNET z.s.p.o.

This service can be considered reliable for the reasons stated in paragraph 4.4.a. The service currently allows the transfer of data up to 500 GB per file and now offers the option of encryption when uploading. The user is thus assured that the data on the portal is stored encrypted (the data is not readable even by the storage administrator). The user must then send the encryption password to the recipients (e.g. by e-mail, SMS, etc.).

b) Services of other commercial portals “ulož.to, uschovna.cz, e-disk, etc.”

On the other hand, these services are not recommend at all due to the high risk of data misuse

4. Use of the “sharing” data storage functionality

The method of sharing within the appropriately selected data storage is certainly the best solution, as it permanently provides users authorized by you with access to the current shared data. Always be careful of the sharing rights you provide to other users.


What to watch out for...

For sensitive or confidential scientific data, the choice of a suitable data storage method is essential, especially from the point of view of guaranteeing the security/confidentiality of stored data or the data management policy.


Last change: October 13, 2020 15:31 
Share on:  
Contact Us
Contact

Residency, Invoicing and Correspondence Address

Charles University

Central Library

Ovocný trh 560/5

116 36 Prague 1

Czech Republic


Office Address

José Martího 2 (2nd floor)

160 00 Prague 6


Phone: +420 224 491 839, 172

E-mail: openscience@cuni.cz

Www: openscience.cuni.cz




How to Reach Us