Research Updates - McLean Hospital Research Community

Report
Research Town Meeting
October 29, 2014Research
Administrators Workgroup
Version: for posting
Agenda

Welcome

Research Updates (Rauch)


Leadership, Space, Performance & Metrics
Studies of Light and Dark (Richter, Chateaneuf, Yale, Zurba)
 Dark: Stories of the Dark side and how the institution is
protecting you and your research
 Light: Making sense of research data: How Research and
Information Security is helping

Anne M. Cataldo Excellence in Mentoring Award
(Greenfield & Rauch)

Reception
2
Welcome
Research Updates
• Dr. Ressler – New CSO and Chief, Depression &
Anxiety Division
• Due to begin full-time August 2015
• Already engaged in meetings and planning
• His lab personnel will start arriving in spring 2015
• Located on 1st floor of Mailman and 3rd floor of Oaks.
• Most of his lab and equipment will arrive in summer 2015
4
Research Metrics
RESEARCH METRICS
Research Activity
FY10
FY11
FY12
FY13
FY14
$s in thousands
Federal Applications - Awarded (#)
Federal Applications - Awarded ($)
27
28,176
36
49,818
23
17,716
16
17,235
47
30,248
Based on fund set-up
Federal Success Rate (%)
13.2%
24.5%
25.3%
11.3%
36.4%
3
1
1
1
0
17
1 (Silveri )
17
1 (Ongur )
16
4
17
0
11
1 (Nickerson )
$30,516
$7,510
$38,026
$32,706
$10,838
$43,544
$31,964
$10,538
$42,501
$33,710
$10,977
$44,687
$33,073
$10,332
$43,405
24.6%
33.1%
33.0%
32.6%
31.2%
FY10
283
385
127
FY11
286
361
132
FY12
313
370
140
FY13
297
410
140
FY13
314
386
140
Center and Consortium Grants
K awards
Investigators winning 1st R01 (or equivalent)
# awarded /# of application (DHHS,ARRA, other Federal)
Grants with >$1 million/year in federal funding (P50,
U01)
Research Financials
Direct Research Revenue
Indirect Research Revenue
Total Research Revenue
Effective Indirect Cost Recovery Rate
Research Personnel
Full Time Equivalent (FTE)
Employee Count (# of people)
Principal Investigators (PI's)
Direct research revenue = direct research expense
= Indirect Revenue/Direct Revenue
5
Proposals Submitted Trend by Fiscal Year
160
312
312
140
296
120
246
DHHS
100
Non-Profit
Foundations
80
All Other Sponsors
Industry/Corporate
60
Other Federal
ARRA
40
20
0
2011
2012
2013
2014
6
McL Research Revenue Trends
Millions
Research Revenues
$60
$50
$40
$30
$20
63%
64%
60%
$10
$0
FY01 FY02 FY03 FY04 FY05 FY06 FY07 FY08 FY09 FY10 FY11 FY12 FY13 FY14
DHHS
Other Federal
Source: PHS Research Revenues FY01- FY14 Actual.
Note: Research Activity, excludes Other Science and P&L adjustments
Industry / Corporate
All Other
7
Research Revenue Metrics
• In FY2014, Total Direct Costs were favorable to budget
• TDC Actual = $33.1M; Budget = $31.8M (FY13 = $33.7M)
• In FY2014, Indirect Costs were unfavorable to budget
• IDC Actual = $10.3M; Budget = $11.0M (FY13 = $11.0M)
• Reflects shift from Federal to alternative funding sources at lower
indirect cost rates (e.g., foundation, industry, philanthropy)
• Indirect cost recovery impacts financial performance of the
hospital
8
Conclusions
• Overall research at McLean remains robust &
successful
• Major investments being made in physical plant
• New CSO; additional recruitments ongoing
• Shifts from Federal to alternative funding sources
reflect national & Partners-wide trends
• Indirect rate negotiation with NIH to occur in FY15
9
Research Town Hall
Studies of Light and Dark
Studies of Light and Dark
Light: Making Sense of Research Data: How Research and
Information Security is helping
Dark: Stories of the Dark side and how the institution is
protecting you and your research
Brent Richter, Associate Director, Enterprise Research
Nicholas Yale, McLean Site Manager, Enterprise Research
Joe Zurba, Research Information Security Officer
Christine Chateauneuf, McLean Information Security Officer,
October 2014-Research Town Hall
Real stories that happen every day –
Joe Zurba & Christine Chateauneuf
Light: How We Make Sense of Research Data and Help
Collaboration
Data Classification
Technology/Tools
Information Security
Syncplicity, Send Secure
Nick Yale and Brent Richter
Data Classification Policy & Data
Classification Standards drafted
Brent Richter and Joe Zurba
Understand Technology-EWS
Survey Feedback
Joe Zurba
Education and Training
Information Security and Privacy Office (ISPO)
Christine Chateauneuf/Joe Zurba
12|
Collaboration-Nick Yale/Brent Richter
What do I use to store or share data?
Tool
What is it?
Secure File Transfer
Large file share
Internal
External
http://transfer.partners.org
Send Secure
Email Encryption
http://rc.partners.org/emailencry
ption/
Shared File Area (SFA)
http://rc.partners.org/storage/sfa
Internal file
share & storage
Research Interactive
Storage (RFA)
Internal file
share & storage
http://rc.partners.org/storage/rfa
Syncplicity
http://rc.partners.org/syncplicity
File share, sync
& storage
14
KnowledgeBase: http://rc.partners.org/kbase?cat_id=29&art_id=533 Contact: [email protected]
Syncplicity – What is it?
Online file-sharing and collaboration tool
• Synchronizes files and folders across multiple devices
• Cross-Platform: Mac, Windows, Android, iOS, WP8
• Share files and folders with collaborators outside of
Partners
• Can be used to share files with Partners co-workers
• HIPAA Compliant, safe for use with ePHI and PII data
**Syncplicity is the only collaboration tool of its kind currently approved by
the Chief Information Security & Privacy Officer for transporting or storing
Partners Confidential Data.
15
1
Syncplicity – Why should I use it?
How do I get started?
1) Request online from the PHS-EGI (Ergonomic Group)
website: http://web1.ergogroup.com/partners/
• Research Instructions: How to place an order in PHS
Ergonomics (EGI).
2) If approved, you will receive a welcome email from
Partners with basic instructions to install the client.
3) FAQs / Screenshots / Best Practices in ERIS
KnowledgeBase: http://rc.partners.org/kbase?cat_id=85
Website: http://rc.partners.org/syncplicity
Contact: [email protected]
16
Licensing Costs
Licensing
• All licenses include unlimited* storage
• Licenses 0-1200: $0 until August 2016. $50/year
thereafter
• Licenses 1201+: $50/year. Licenses run annually
from August to August (costs will be pro-rated if
purchased out of annual cycle)
Ordering:
• Via EGI: http://web01.ergogroup.com/partners
Support:
• Via Partners Service Desk
• EMC or ERIS KnowledgeBase
Website: http://rc.partners.org/syncplicity
Contact: [email protected]
17
1
Data Classification-Brent Richter/Joe Zurba
How Data is Classified Today
•All Data and
information generated
Confidential within Partners and
Hospitals
or PII/PHI
•Research,
Administration, etc
19
Proposed Data Classification (Research)
High Risk
• Extremely Sensitive PII/PHI
• National Security
• Criminal Liability if Disclosed
Confidential
• Contractual or Regulatory Data
• PHI or PII
• Financial Information
• Legal, Regulatory, or Serious Legal, Psychological, Social, Financial
Harm if Disclosed
Institutional
• Non-confidential data that Partners has chosen to keep private
• Expectation of Privacy
• Small Reputational Risk if Disclosed
20
Proposed Data Classifications
• Institutional Information
– Information, the disclosure of which would not cause material harm,
but which an organization has chosen to keep confidential
– There is an expectation of privacy
• Data that is: de-identified, unpublished work, Personnel records, IP or
Patentable, building plans, etc
• Confidential Information
– Information that would cause material, or serious harm to individuals
if released
• PHI, PII, PCI and FERPA information, IP and IRB-sensitive data, financial
records, donor information, genetic information,…
• High Risk / National Security
– Information that would cause severe harm to individuals or
Partners Healthcare if disclosed
21
A Practical Approach to Securing Devices




Applications and data are
grouped into the logical
privacy pools
Each pool has a privacy
classification
As the privacy classification
increases so does the set
of device prerequisites
necessary to access* pool
The specific requirements
to be a trusted device will
vary by the pool accessed*

Device Prerequisites
Partners network +
Specific information pool
security requirements
•
•
Partners Device Policy
Additional NAC
verifications
3: High Risk
Information which, if disclosed,
would cause serious or severe
harm to individuals or
organizations
2: Confidential
Information which contains
personally identifiable health
data
Partners Network
•
NAC verification
connection
Requirements are defined by
the application and data owner
*Note: privacy classification also
applies to the devices where data
objects are stored
Pool Privacy Classification
Public Internet
•
No prerequisites
1: Institutional
Information which Partners has
chosen to keep confidential
0: Public
Information which is publicly
available
Trusted Device
Semi-trusted Device
Untrusted Device
22
Technology and Tools-Exchange Web Services
(EWS) Survey-Joe Zurba
History
• Partners has a goal to increase security for all Internetfacing applications by implementing 2-factor
authentication and security questions
• EWS, or Exchange Web Services, is the protocol that
allows Macintosh computers to communicate with
Partners’ email servers for Outlook and Apple Mail
• *PC users have to use VPN from outside of Partners in
order to use Outlook
• VPN is a way to enforce 2-factor authentication
• VPN, or Virtual Private Networking, is software that
creates a secure tunnel between your machine and the
Partners network
24
The Survey
• Gather feedback from our research community
• Sent to Research email lists at McLean, BWH, MGH,
SRH, as well as EFGH
• Asked 7 to 9 questions about how the proposed change
would affect you and how you work
25
The Results
437 Total
Responses
339 Full
Responses
26
The Results (cont)
59% Use Outlook or Apple Mail
Remotely
58% Do Not Use VPN
67% It Will Affect How Mail is
Accessed
57% Not Worth the Increase in
Security
7% Use Gmail or Another
Provider for Partners’ Business
27
Lessons Learned
28
You Said……
• I don’t have confidential information in my email so
there’s no security risk
• Password breaches are not common
• VPN is unreliable, complex, and inconvenient
• Security is a trade off between access and protection
• It’s excessive
• The survey is too technically worded
• I don’t care about security
• Will it affect my iPhone?
• Convince me that it will improve security
• Anything that requires a high level of security should
not be on the common network
29
We Heard You….
• The EWS retirement is on hold
• Looking at alternative technologies that would have
less of an impact
• Looking for the “right amount of security”
• But…
This may be inevitable
30
The Dark Side-How We Protect You
and Your Research
The Partners Information
Security and Privacy Office
(ISPO)
• Detected 4,789 Viruses
• Stopped 5 Mil +
unintended recipients
• Spam, etc.
Education and Training
• User responses still result
in malware and viruses
from Phishing e-mails
• Security Bulletins
• Information Security and
Privacy Week (10/27-10/31)
• Staff Meetings
McLean Top 2:
Phishing-User response to
emails which generate
malware
Encryption-All mobile devices
used for business purposes
• Other?
Your help maintains our ability to obtain and retain grants, provide
care to patients (reputation), etc.
31
Discussion & Feedback
32|

similar documents