Security, and Retention & disposal

  • Data security encompasses methods of protecting data from unauthorized access, modification, or destruction. Security methods include:
    • Data encryption - this is a method reliant on the creation of a strong password. It is recommended to consider data encryption while sharing and storing data in networked drives, NAS devices, and external storage devices. Encryption should be used in conjunction with other controls such as access-control or authentication. An easy method encryption is to create an encrypted archive file (.zip) where the software required for decryption is freely available.
    • Storing data offline. Confidential data can be stored on a computer that in not connected to any network.
    • Anti-virus software. To secure digital research data, have up to date anti-virus software.
  • Data retention refers to keeping data for a specified length of time according to the sponsor's, funder's or your own guidelines. This may include the secure disposal of confidential data. You may want to create a retention schedule for your records.
  • Check with your agency for minimum retention periods.
  • If the research data is a candidate for long-term retention, researchers must make allowances for storage cost, metadata maintenance and human ethics requirements early in the research data management planning.
  • Data disposal methods include:
    • for digital data, use destruction programs that will erase data more completely than manually deleting files, such as Permanent Eraser.
    • for non-digital data, destroy physical records after seeking approval from the appropriate governing bodies that may also be responsible for your data.
    • records the details of destruction, such as what was destroyed, when it was destroyed and by whom.