AutoLit® User Guide
Examining Results in Synthesis
Administrative Tools
Support and FAQs
How to Perform Systematic Review
How to Perform a Meta-Analysis
Best Practices for Writing Your Manuscript
Additional Tips for Making a Nest
AutoLit® User Guide
Examining Results in Synthesis
Administrative Tools
Support and FAQs
How to Perform Systematic Review
How to Perform a Meta-Analysis
Best Practices for Writing Your Manuscript
Additional Tips for Making a Nest
Information Security will be managed by the following personnel:
All policies will be reviewed on an annual basis or earlier, should a major system changed occur.
In the event of a change in role, a departure, or a new hire, oversight of the affected security policies will be transferred to the new information security personnel. Management of information technology systems will be transferred to the appropriate engineer. Barring no sudden change, the transition will take place over two to eight weeks and will include training, knowledge checks, and progressively increasing responsibility over policies.
The Data Protection Plan helps us prepare to identify and protect personal data. A data protection impact assessment (DPIA) is required for projects where data processing is “likely to result in a high risk to the rights and freedoms of natural persons.” The plan here outlines our procedure for developing a DPIA.
This plan applies to all Nested Knowledge employees, and all contractors, consultants, temporary employees and business partners.
High-Risk personal data includes:
The DPO, responsible for approving data processing projects, is Karl Holub.
DPO Email: karl.holub@nested-knowledge.com
Nested Knowledge will fill out a data protection impact analysis before processing any high-risk personal data.
For templates to complete the above steps, refer to the ICO guidance
Nested Knowledge does not process high-risk personal data. Potential high-risk data types we may encounter in our industry include the following:
Nested Knowledge values the privacy of our employee and users. We have no intention to process such data, but we will remain alert and develop a DPIA should our data processing plans change.
Employee training requirements are based on the data classification system. All employees and contractors will be provided with our data protection policy. Those who deal with confidential data, restricted use data, or high-risk personal data will be required to demonstrate understanding of our data protection procedures.
As described in our Third Party Policy, we will notify users of changes to how their data is processed at least 7 days in advance.
The purpose of this policy is to ensure that data used within Nested Knowledge’s systems is regularly backed up.
This policy affects all employees and contractors of Nested Knowledge. Employees who deliberately violate this policy will be subject to disciplinary action up to and including termination.
This policy applies to all computer and communication systems owned or operated by Nested Knowledge and it’s subsidiaries. Systems include company shared drives, purchased software, as well as access to the Nested Knowledge AutoLit review platform. Similarly, this policy applies to all platforms (operating systems) and all application systems. Reviews developed in the AutoLit software by parties external to Nested Knowledge are not covered in this policy.
Remote workers are responsible for ensuring that their remote systems are backed up on a periodic basis.
Backups are generated as database snapshots daily; transaction logs are streamed to storage and stored for 14 days (providing moment in time restoration within that window). Failure in either of these processes generates email alert to the technical lead. Database backups are fully exercised no more than every 3 months. Backups are retained 60 days. A failure in restoring a backup results in highest priority escalation with the development team on our product management software.
In addition to backups on our main cloud provider (AWS), we generate & store backups on a separate cloud provider (GCP) as a redundancy. These backups are generated every other day, retained 60 days, and exercised quarterly. Failure in the backup process results in email alert to the technical lead.
Testing
Backup and restore procedures must be tested at least annually. Issues with backups identified should be documented and remediated.
Author | Date of Revision/Review | Comments/Description |
---|---|---|
K. Cowie | 11/17/2021 | Initial Draft Completed |
K. Holub | 05/26/2023 | Off provider database back ups |
K. Kallmes | 11/19/2021 | Draft approved |
P. Olaniran | 11/7/2022 |