Skip to content

Add Security Best Practices Section to DISCOVER Cookbook #155

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 8 commits into
base: main
Choose a base branch
from

Conversation

Susmita331
Copy link

This PR adds a Security Best Practices section to the DISCOVER Cookbook. It offers clear guidance on data privacy, handling backups, setting up firewalls, and using tools like netcat safely. These updates aim to help event organizers and technical users improve security with practical, easy-to-follow steps.

Copy link
Member

@aterrel aterrel left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  1. I don't think this page as written fits with the tone and depth of the guide. Would rather see something more along the lines of requirements for technical systems.
  2. Additionally the title is a bit misleading as the article is about "cybersecurity" which is important, but when I saw "security" I was thinking "physical security", i.e. how to have guards etc.
  3. Would move this to higher in the guide so contributing stays the last section.


- **Test Your Backups Regularly**:
- Periodically check that your backup files are complete and can be restored without errors.
# `netcat`: A Powerful Network Tool to Use with Caution
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This section seems out of place. Please remove.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

agreed - netcat is not relevant here.


## Practical Security Measures

1. **Protect Online Forms**
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The rest of the guide really doesn't dive into technical details of registration and web systems. I think this advice here is so overly vague as to not be helpful. Perhaps a better approach would be to provide checklist of features required by any conference web system.

@Susmita331
Copy link
Author

Susmita331 commented Jan 15, 2025 via email

@aterrel aterrel added the ✍️ new content new content to be created label Jan 26, 2025
@@ -0,0 +1,109 @@
# Ensuring Privacy and Security in Event Management
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As @aterrel wrote in a general comment, the title of this section is misleading as the focus here is on data systems, not physical privacy or security, which is also what I thought it would be initially.

- Avoid collecting unnecessary personal details.

2. **Implement Secure Data Management**
- Store all attendee information in encrypted databases.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think most organizers use databases but rather spreadsheets or files.

- Restrict data access to authorized personnel only.

3. **Follow Legal and Ethical Standards**
- Review applicable privacy regulations for your region, such as GDPR or CCPA.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In many cases, the relevant regulations apply to people, not the organizers, so organizers need to follow all regulations that are associated with their attendees.


## The Importance of Privacy in Events

Event organizers often collect sensitive attendee information, such as contact details, dietary restrictions, and accessibility needs. Protecting this data builds trust, enhances reputation, and ensures compliance with regulations like GDPR (General Data Protection Regulation) and CCPA (California Consumer Privacy Act).
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Probably also mention PIPL (China)

4. **Prepare for Potential Breaches**
- Create a comprehensive data breach response plan.
- Communicate promptly and transparently with affected individuals in case of a breach.
5. **Use a Firewall to Block Unauthorized Access to Your Network and Devices**
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

5 and 6 here are quite general, not really related to events. Perhaps this should be combined into "Follow good security practice" or be removed.

@@ -17,4 +17,5 @@ chapters:
- file: 11_inclusive_practices_during_checkin
- file: 12_assessment
- file: 14_how_to_contribute
- file: 15_security_best_practices
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

please make this title more related to electronic or data security

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
✍️ new content new content to be created
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants