Secure Data Storage

Processes to protect electronic and hard copy data in all forms, including questionnaires, interview tapes and electronic files from being accessed without authority or damaged.

Advice

Protecting against damage

The two main disadvantages of digital storage media are that digital formats are unreliable and subject to failures, and over time file formats and storage devices will become obsolete.

To protect against these dangers, the UK Data Archive (Van den Eynden et al. 2011, p. 18) suggests that best practice is to:

  • Convert digital files to appropriate file formats (see below)
  • Transfer digital data to new storage media every two-five years to guard against the degradation devices
  • Set up regular checks on the integrity of data files
  • Use two separate forms of storage for data
  • Create digital versions of paper and analogue data (see Backup)
  • Label and organize items in storage clearly
  • Make sure that the physical location of storage systems is appropriate, and protected from natural events such as fire or flood

Protecting against unauthorized access

Another important consideration in the storage of data is the protection of data from unauthorized access, theft, or unintentional destruction of data. 

There are three main security considerations to keep in mind: physical data security, network security, and security of computer systems and files.

The UK Data Archive (Van den Eynden et al. 2011, p. 19) recommends researchers take steps to ensure that:

  • The physical location of data storage is secure with controlled access and a system where records are kept of the removal of and access to data.
  • The transporting of physical data or data storage systems is limited to necessity.
  • Digital data are not stored on externally networked servers or computers.
  • Operating systems have necessary firewalls and security systems to protect against malware and viruses.
  • Computer systems are password protected
  • Power surge protection systems are in place
  • Restricted materials are encrypted
  • Restricted data is only transferred in an encrypted form, and the transfer of data through email and File Transfer Protocals (FTP) are avoided
  • Users and managers of data sign non-disclosure agreements

Resources

Managing and Sharing Data: This document, created by the UK Data Archive, gives researchers an overview of the best practices involved in data management for long-term, accessible data storage, protection and archive.

Sources

Van den Eynden, V., Corti, L., Woolard, M., Bishop, L. and Horton, L. (2011). Managing and sharing data: Best practice for researchers. UK Data Archive, University of Essex: Essex.

Updated: 19th August 2014 - 4:19pm
This Option is useful for:
A special thanks to this page's contributors
Author
BetterEvaluation Website and Engagement Coordinator, BetterEvaluation and ANZSOG.
Melbourne, Australia.

Comments

There are currently no comments. Be the first to comment on this page!

Add new comment

Login Login and comment as BetterEvaluation member or simply fill out the fields below.