Access to raw data should always be restricted to those working on the project. Typically, the more people who have access to sensitive data, the greater the chance that confidentiality can be compromised, either accidentally or deliberately. Good information security practices include implementing role-based restrictions, monitoring who has access to the data, and limiting the ability to copy datasets.