Computing or storage environment for research

Purpose

Choosing the correct location for your data will allow you to manage and protect your data to meet the requirements and expectations for your research project. The University provides a number of solutions.


Audience

researchers


On this page


Initial considerations

Determine your data's classification.

Determine other project requirements.

  • A non-exhaustive list of requirements to consider when selecting a research environment include:

    • Legislative and/or regulatory obligations,

    • contractual and agreement obligations (e.g.; data share [DSA], material transfer [MTA]),

    • human ethics and animal use protocols,

    • research project stage,

    • backup requirements,

    • funding and cost limitations,

    • collaboration and sharing capabilities, and

    • space requirements.


What can I do?

Evaluate possible institutional options.

Contact your local IT about what divisional or departmental options are viable for your research.

If institutional and divisional offerings are unsuitable, you may choose to manage your own systems.


Search

How do I...


Additional help

General

Contact us | Information Security (IS)

Contact us | Information Technology (IT)

Researchers

https://security.utoronto.ca/services/research-information-security-program/


Related articles

 

 

Â