Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
🎓 Purpose
File naming conventions help not only with the organization your research data but are important considerations when it comes to protecting the confidentiality of research participants and other data subjects.
👥Audience
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
On this page
Expand | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||
|
|
Initial considerations
Determine your data's classification.
Classifying your data is an important step in understanding the risks associated with your data.
While secure naming conventions are preferred regardless of data classification, files containing Level 3 and level 4 data should take confidentiality and privacy into account when naming files.
Consult your human ethics or animal use protocol.
Your human ethics protocols or animal use protocols may outline specific privacy obligations regarding hiding or obfuscating certain types of information, therefore it is important to review your protocol when determining a naming convention.
If you are unsure about your obligations, please contact the relevant ethics unit.
\uD83D\uDCD8 What can I do?
Consult with the Research Data Management experts within U of T Libraries.
https://onesearch.library.utoronto.ca/researchdata/organizing-your-data
Consistently formatted and descriptive filenames that avoid using special characters and spaces help to:
clearly outline the purpose and content of a file,
improve search functionality and organization of project,
reduce the chance of unintentional, unauthorized access or transfer,
reduce the chance of duplication and/or misplacement of data,
reduce the chance of errors or corruption during transfer.
Avoid including sensitive or confidential information in filenames.
Sensitive or confidential information should not be included within filenames, as it may expose the personal and/or private information of data subjects, project members, or the University to unauthorized individuals.
Such information may include, but is not limited to:
direct identifiers, such as: names, addresses, phone numbers, email addresses, government-issue identification numbers, etc.,
indirect identifiers, where in conjunction with other local data elements, could identify an individual, such as: geographic indictors, birth dates, etc.
Page Properties | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||
|
🔍 Search
Live Search | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
✉️Additional help
General
https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%9B%A1%EF%B8%8Fus#Information-Information-Security-(IS)
Researchers
https://onesearch.library.utoronto.ca/researchdata/research-data-management
https://security.utoronto.ca/services/research-information-security-program/
\uD83D\uDCCB Related Related articles
Filter by label (Content by label) | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|