Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
Purpose
Choosing the correct location for your data will allow you to manage and protect your data to meet the requirements and expectations for your research project. The University provides a number of solutions.
👥Audience
Status | ||||
---|---|---|---|---|
|
On this page
Expand | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||
|
|
Initial considerations
🔢Determine your data's classification.
Classifying your data is the first step to knowing what safeguards are required to securely process or store your data.
✅Determine other project requirements.
A non-exhaustive list of requirements to consider when selecting a research environment include:
Legislative and/or regulatory obligations,
contractual and agreement obligations (e.g.; data share [DSA], material transfer [MTA]),
human ethics and animal use protocols,
research project stage,
backup requirements,
funding and cost limitations,
collaboration and sharing capabilities, and
space requirements.
\uD83D\uDCD8 What What can I do?
🔍Evaluate possible institutional options.
These systems are managed by technical experts at the University, divisional, or departmental level, allowing you to focus more on your research, rather than on maintaining the security of unmanaged systems.
💽Contact your local IT about what divisional or departmental options are viable for your research.
https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%96%A5%EF%B8%8F-Informationus#Information-Technology-(IT)
🖥️If institutional and divisional offerings are unsuitable, you may choose to manage your own systems.
Ensure that you meet the confidentiality, integrity, availability, and privacy requirements and expectations of your research project.
Page Properties | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||
|
🔍Search
Live Search | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
✉️Additional help
👥General
https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%9B%A1%EF%B8%8F-Informationus#Information-Security-(IS)
https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%96%A5%EF%B8%8Fus#Information-Information-Technology-(IT)
🔬Researchers
https://security.utoronto.ca/services/research-information-security-program/
\uD83D\uDCCB Related Related articles
Filter by label (Content by label) | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|