Secure Data Management for Utility Surveys

3. Data collection

At the data collection stage, the surveyor should refer to the risk assessment and should:

01. Carry out data collection in accordance with the survey plan and risk assessment. If no additional security measures were stipulated and the feld surveyor/s feel the survey warrants them, they should talk to the lead surveyor about the potential vulnerabilities and risks, and if these need to be discussed with the client.

02. Adhere to theft mitigation measures. Ensure any tracking and locking mechanisms and entry pins on equipment are used. The feld surveyor/s should be aware that the data could be potentially more valuable than the equipment. If the equipment and data is stolen, inform the client, the building owner, the building occupier and the police as soon as possible.

03. Ensure the lead surveyor is aware of any data collected above the requirement.

04. If using a removable drive or memory card, remove the drive or card from the equipment as soon as data collection is complete and keep it in a secure place until the data can be transferred to a secure data storage location.

05. Ensure the data transfer method and device/s are appropriately secure. Do not rely on open insecure WiFi networks in public places.

06. When transporting equipment to and from site, ensure it is secure (preferably caged within a vehicle). If the survey requires overnight stays, transfer the equipment from the vehicle to a secure location overnight.