Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

🎓 Purpose

File naming conventions help not only with the organization your research data but are important considerations when it comes to protecting the confidentiality of research participants and other data subjects.

👥

Audience

Status
colourBlue
titleresearchers
Status
colourRed
titleAdmin staff

🔖 Contents


On this page

Expand
titleExpand to view table of contents.
Table of Contents
minLevel1
maxLevel3
include
outlinefalse
indent
styledefault
excludePurpose|Audience|
Contents
On this page|Search|Additional help|Related articles
typelist
class
printablefalse

(question)Initial considerations

🔢Determine your data's classification.

  • Classifying your data is an important step in understanding the risks associated with your data.

    • Classify data

    • While secure naming conventions are preferred regardless of data classification, files containing Level 3 and level 4 data should take confidentiality and privacy into account when naming files.

🔍Consult your human ethics or animal use protocol.


\uD83D\uDCD8 What can I do?

📚Consult with the Research Data Management experts within U of T Libraries.

  • https://onesearch.library.utoronto.ca/researchdata/organizing-your-data

  • Consistently formatted and descriptive filenames that avoid using special characters and spaces help to:

    • clearly outline the purpose and content of a file,

    • improve search functionality and organization of project,

    • reduce the chance of unintentional, unauthorized access or transfer,

    • reduce the chance of duplication and/or misplacement of data,

    • reduce the chance of errors or corruption during transfer.

*️⃣Avoid including sensitive or confidential information in filenames.

  • Sensitive or confidential information should not be included within filenames, as it may expose the personal and/or private information of data subjects, project members, or the University to unauthorized individuals.

    • Such information may include, but is not limited to:

      • direct identifiers, such as: names, addresses, phone numbers, email addresses, government-issue identification numbers, etc.,

      • indirect identifiers, where in conjunction with other local data elements, could identify an individual, such as: geographic indictors, birth dates, etc.


Page Properties
hiddentrue

Name

Role

Date

Michael Laurentius

Author

Approver (Manager)

Reviewer

Live Search
spaceKeyISH
sizelarge
additionalpage excerpt
placeholderHow do I...
typepage
labelskb-how-to-article,kb-spec-how-to-article,kb-strategy


✉️Additional help

👥General

https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%9B%A1%EF%B8%8F-Informationus#Information-Security-(IS)

🔬Researchers

https://onesearch.library.utoronto.ca/researchdata/research-data-management

https://security.utoronto.ca/services/research-information-security-program/


Filter by label (Content by label)
showLabelsfalse
maxCheckboxfalse
showSpacefalse
reversefalse
excerptTypesimple
cqllabel in ( "rdm" , "secure" ) and title !~ "Securely nameNaming"