New Admins: Register for our new Pure Lecture Series!
Pure's logos
Pure Help Center for Pure Administrators

If you are a researcher, or other non-admin at your institution, click here.

  • Home
  • Announcements
  • Release Notes
  • Technical user guides
  • Training
  • Events
  • Support
  • Contact Us
  • Home
  • Training
  • Technical user guides
  • Pure installation and upgrade guide (self-hosted customers only)

How Can We Help?

Search Results

Filter By Category

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Contact us

Pure LTP and DSpace7 securityPure LTP and DSpace7 security

General consideration

When transferring restricted data across different systems, it is crucial to recognise that each system may have its own unique permission models and security protocols. This means that data protected in one system, such as Pure, may not have the same level of protection in another system, like DSpace7.

In general, we do not recommend sending restricted data to DSpace7 due to the following reasons:

Different Permission Models: DSpace7 may not offer the same granularity or robustness in its permission settings as Pure, potentially exposing sensitive data to unauthorised access.

Security Protocols: The security measures in place in DSpace7 may not align with the requirements needed to protect restricted data, increasing the risk of data breaches.

Compliance Risks: Transferring restricted data to a system that does not meet compliance standards can lead to legal and regulatory issues, especially if the data is subject to specific data protection laws.

Lack of Control: Once data is transferred to DSpace7, it may be more challenging to control access and monitor usage, which is critical for maintaining the confidentiality and integrity of restricted data.

Institutional Policies: Many institutions have specific policies regarding the handling and storage of restricted data. Transferring such data to a system that does not meet these policies could result in violations.

Given these considerations, it is advisable to explore alternative solutions for managing restricted data that ensure compliance with security and privacy standards. If there is a need to use DSpace7, consider implementing additional safeguards or consulting with IT security professionals to assess the risks and develop a mitigation strategy.

How Pure Implemented Security Measures to Protect Data in DSpace7

General Behaviours Across All Content Types

Pure has established a robust framework for managing and protecting data through various security measures. Here’s an overview of how these measures are implemented, particularly in relation to content visibility and confidentiality. The DSpace7 UI, will only display files that are placed in the "ORIGINAL" bundle, meaning that even when logged into the UI, files placed in other bundles will only be visible through editing the items.

Confidential Content

All confidential content is stored in Pure with confidentiality visibility. This ensures that sensitive information is not exposed to users where it wasn't intended. DSpace7 does not have a specific concept for confidential content, which necessitates caution when considering the transfer of such data to this system.

Content Visibility: Pure categorises content visibility into three main levels, each with specific access controls

Public: No restrictions

Implementation: Files are placed in the "ORIGINAL" bundle, unless other restrictions apply (see below).

Access Control: Policy set for "Anonymous" access. This allows anyone to view the metadata without any authentication.

Campus: Restricted to a specific IP range (e.g., university campus)

Implementation: All files are placed in a "BACKEND" bundle.

Access Control: No policies are applied. DSpace7 does not have a concept of campus access, this means that data will not be publicly available in DSpace7, setting no policy is effectively limiting access to non-authorised users.

Backend: Restricted to Pure users only

Implementation: All files are placed in a "BACKEND" bundle.

Access Control: No policies are applied. This ensures that the data is not publicly accessible in DSpace7 without authorised access, maintaining a high level of security for sensitive information.

 

Research Output Electronic Version File Access

Pure employs a structured approach to managing access to electronic versions of research outputs, categorising them into different access types. Each type has specific handling and security measures to ensure appropriate access control. Here’s a breakdown of how each access type is managed:

Open

Implementation: The file is placed in the "ORIGINAL" bundle. 

Access Control: The policy group is set to "Anonymous," allowing unrestricted access to the file. Anyone can view and download the file without authentication.

Embargoed

Implementation: The file is placed in the "ORIGINAL" bundle. 

Access Control: The policy group is set to "Anonymous," but with a Start Date that corresponds to Pure's embargo end date. This means that while the file is technically available, access is restricted until the embargo period expires.

Restricted

Implementation: The file is placed in a "BACKEND" bundle. 

Access Control: No policy group is set, meaning that the file is completely restricted from public access. Since DSpace7 does not have a concept of campus access, a stricter access model is applied to ensure that only authorised users can access the file.

Closed

Implementation: The file is placed in a "BACKEND" bundle. 

Access Control: No policy group is set, meaning that the file is completely restricted from public access. Only users with appropriate permissions within Pure can access the file.

Unknown

Implementation: The file is placed in a "BACKEND" bundle. 

Access Control: No policy group is set, and this access type is treated with the same restrictions as "Closed." This ensures that files with an unknown status are not accessible to unauthorised users.

Student Thesis and Datasets File Visibility

Public - no restrictions

Implementation: The file is placed in the "ORIGINAL" bundle. 

Access Control: The policy group is set to "Anonymous," allowing unrestricted access to the file. Anyone can view and download the file without authentication.

Campus - Restricted to specific IP range

Implementation: The file is placed in a "BACKEND" bundle. 

Access Control: No policy group is set, meaning that the file is completely restricted from public access. Since DSpace7 does not have a concept of campus access, a stricter access model is applied to ensure that only authorised users can access the file.

Backend - Restricted to Pure users

Implementation: The file is placed in a "BACKEND" bundle. 

Access Control: No policy group is set, meaning that the file is completely restricted from public access. Only users with appropriate permissions within Pure can access the file.

Student Thesis and Datasets File Embargo Check

Implementation: The file is placed in the "ORIGINAL" bundle. 

Access Control: The policy group is set to "Anonymous", but with a start date that corresponds to Pure's embargo end date. This means that while the file is technically available, access is restricted until the embargo period expires.

Published at December 18, 2024

Download
Table of Contents
  1. General consideration
  2. How Pure Implemented Security Measures to Protect Data in DSpace7
  3. General Behaviours Across All Content Types
  4. Confidential Content
  5. Content Visibility: Pure categorises content visibility into three main levels, each with specific access controls
  6. Research Output Electronic Version File Access
  7. Student Thesis and Datasets File Visibility
  8. Student Thesis and Datasets File Embargo Check
Related Articles
  • Pure requirements
  • End of support announcements for Pure
  • Installing Pure on Linux
  • Manual Pure deployment on Linux
  • Pure database URL

Was this article helpful?

Yes
No
Give feedback about this article

    About Pure

  • Announcements

    Additional Support

  • Events
  • Client Community
  • Training

    Need Help?

  • Contact Us
  • Submit a Support Case
  • My Cases
  • Linkedin
  • Twitter
  • Facebook
  • Youtube
Elsevier logo Relx logo

Copyright © 2025 Elsevier, except certain content provided by third parties.

  • Terms & Conditions Terms & Conditions
  • Privacy policyPrivacy policy
  • AccesibilityAccesibility
  • Cookie SettingsCookie Settings
  • Log in to Pure Help CenterLog in to Helpjuice Center

Knowledge Base Software powered by Helpjuice

Expand