Skip to Main Content
Purdue University Purdue Logo Purdue Libraries

Data Management for Health and Human Sciences

Research Data Management overview and resources for students and faculty focusing on health and human sciences

Storing Your Data

Data storage in research refers to the process of saving and accessing research data during the active collection and analysis phases of a research project, where the focus is on storing data securely and accessibly while actively working on it, as opposed to long-term preservation or archiving once the project is complete; it involves choosing a suitable storage location, considering factors like data sensitivity, access control, and backup strategies to prevent data loss.

Purdue has many data storage options to choose from to fit your projects needs. Here are some resources to get you started:

Guidelines for Data Backup

Data storage refers to holding your data files in a secure location that you can readily and easily access. Data backup, in contrast, refers to saving additional copies of your data in a separate physical or virtual locations from data files in storage. Keeping reliable backups is an important part of data management. Regular backups protect against the risk of damage or loss due to hardware failure, software or media faults, viruses or hacking, power failure, or even human errors.

Remember to use the Backup 3-2-1 Rule:

  • 3 copies of your data - 2 copies are not enough
  • 2 different formats - i.e. hard drive+tape backup or DVD (short term)+flash drive
  • 1 off-site backup - have 2 physical backups and one in the cloud

Backup options:

  • Hard drives - personal or work computer
  • Departmental or institution server
  • External hard drives
  • Tape backups
  • Disciplinary archives (repositories)
  • Cloud storage

Guidelines for Data Security

Data security refers to the protection of data from unauthorized access, use, change, disclosure and destruction and includes network security, physical security, and file security. Security needs to be considered for all copies of your data, including your working data set, backup copies, and archived copies.

Network security

  • Keep confidential data off the Internet
  • Put sensitive materials on computers not connected to the internet

Physical Security

  • Restrict access to buildings and rooms where computers or media are kept
  • Only let trusted individuals troubleshoot computer problems

Computer Systems & Files

  • Keep virus protection up to date
  • Don’t sent confidential data via e-mail or FTP - use encryption, if you must send data
  • Use passwords on files and computers

 

The following infographic depicts the four levels of data security and examples of the types of research falling into each category mentioned below:

Level one: Fundamental Research (published and shared broadly)

Level two: Sensitive Research (non-personal data / de-identified data)

Level three: Restricted Research (health data / HIPAA, student data / FERPA)

Level four: Export Control Research (government regulated technology, defense non-classified related)

Pyramid graphic showing the four security levels in research data

Click on the image to see RCAC's Quick Guide to the four levels of data security.

Secure Data Resources