Data capture or collection practices differ across disciplines and must be detailed in the Data Management Plan. Researchers must use platforms endorsed by the University for the collection, capture, or collation of data of sensitive or highly sensitive data.
The platforms include those listed in the following Platforms Table
Researchers document a storage and access plan for ‘active’ or ‘operational’ data (data in current use) which considers:
This is to help safeguard against:
The following section provide researchers with a list of appropriate security measures and storage options for active data according to its sensitivity classification.
The Platforms Table (MQ login required) outlines the storage options endorsed by the University. . The systems endorsed by the University have been carefully chosen and provide controlled access as well as regular snapshots to safeguard against data loss and disaster management. By choosing an endorsed platform, some of the risks associated with research data storage are managed for you by the University.
Security practices must be applied to all data to prevent unauthorized access. The sensitivity level of the data determines the security practices that must be applied during data management.
The following Security Table (MQ login required) outlines the recommended security measures endorsed by the University
A system or platform that has not been endorsed can be proposed if the platforms or tools endorsed by the University do not meet your specific requirements. If, however, the system will be used for sensitive data the following must apply:
The researcher is responsible for providing all necessary information to assess the suitability of the proposed platform or tool. For some systems, the researcher will need to take additional steps to meet requirements, such as automatically exporting data to an endorsed system.
The software being used for analyses and the formats you use will influence the management of these files over time and influence the future interoperability of the data.
Using non-standard or proprietary formats may limit the long-term use and preservation of the data as these formats are not widely readable by many programs.
Proprietary software is owned by a company that restricts distribution of the software and prevents examination of its source code (e.g. MS Excel and Adobe Acrobat). Open-source software, by contrast, is licensed in ways that facilitate wider distribution and allow access to the software’s source code.
This distinction extends to file types. A proprietary file format is closed; its definition may be confidential. If the company that owns the file format and the software that can read it goes out of business or changes the format, users may lose the ability to read the files, with little recourse. Open file formats have publicly available definitions. Since the definitions of these formats can be examined, anyone can write a program to open, read, or convert the files, regardless of any actions taken by the company or organisation that maintains the software.
Note that in many cases, open-source software can open proprietary file formats and vice versa (for example, LibreOffice Write, a popular open-source alternative to Microsoft Word, can read and write Word files, although complex Word files may not import or render correctly).
In many domains, a particular file format, usually an open one, has come into wide use as an archival format. Examples include PDF/A for documents, comma-separated values (CSV) for tabular data, Digital Negative (DNG) for raw images, or GeoJSON for geospatial data.
Five Safes
Password management
File Formats Guide