- Find Information
- Research Guides
- Research Data Management
Research Data Management
Data Storage
It's best to store data in one central location for -
- Easy access
- Duplication
- Version control
- Keeping a list
UTSA offers storage solutions and server management through University Technology Solutions (UTS).
Image by PublicDomainPictures from Pixabay
- UTS Storage SolutionsLearn more about storage solutions on campus including OneDrive, I:Drive, SharePoint Online, and desktop storage.
- UTS Server ManagementUTS provides services for servers around UTSA. Services include new server installation, server operating systems configuration, Naming (DNS), IP Protocol DHCP-Dynamic Host Configuration Protocol, and file services.
- UTSA High Speed Computing Fact SheetUTSA Arcturus is an on-campus high speed advanced cyberinfrastructure research platform. This sheet describes features and specifications for the platform.
- UT Research Cyberinfrastructure (UTRC)Can be especially helpful for large amounts of data and/or special computational resources (e.g., analysis, visualization, consultation about advanced systems)
- UTRC Fact SheetThe UTRC program provides researchers at all 13 UT System institutions access to advanced computing capabilities at the Texas Advanced Computing Center.
- Texas Advanced Computing Center (TACC)TACC designs and operates some of the world's most powerful computing resources. The center's mission is to enable discoveries that advance science and society through the application of advanced computing technologies
Data Backup
Data is worthless if lost. Therefore keeping reliable backups is integral to data management.
3-2-1 Rule
Always retain
3 copies of anything important, the original and two copies stored on at least
2 different media formats (i.e., hard drive, shared server, flash drive, cloud storage, etc.) with at least
1 copy off-site or in cloud storage.
Image by Photo-Mix from Pixabay
3rd Party Backup Options
Data Security
Depending on the type of data, security can also be a significant concern
- Passwords should be strong and differ from account to account
- Keep antivirus software and operating system updated
- Security patches are frequently released to repair loopholes and backdoors
- Unencrypted data is more easily read but encryption may be necessary for sensitive data
- If encrypting - keep passwords and keys on paper (2 copies), and in an encrypted digital file
- Don’t rely on 3rd party encryption alone
- If sensitive data (such as that from interviews, human subjects, or other private/protected information) is used then you should have a plan in place to destroy, redact, and/or anonymize the data to protect the participants.
- Uncompressed data is also ideal for storage, but if space is limited, only compress your 3rd backup copy
Image by Blue Coat Photos from Flickr
For more information about responsible acquisition and storage of sensitive information contact:
- UTSA Office of Research IntegrityThe Office of Research Integrity (ORI) supports the UTSA research community in its commitment to high standards of research integrity and scholarly excellence. They promote ethical behavior and best practices by anticipating risk and communicating research compliance standards for meeting research goals.
- UTSA University Technology Solutions (UTS)Maintain a program that reduces risk, secures information assets against unauthorized use, disclosure, modification, damage or loss; is documented and verifiable; and meets regulatory compliance requirements.