Data Storage, Backup, and Security Prepared by: Christopher Eaker, University of Tennessee, Knoxville CC BY-NC
Learning Objectives 1.Understand why data storage, backup, and security of research data are important 2.Understand data storage, backup, and security methods for research data 3.Understand best practices for research data storage, access control, migration to newer storage media, and security for research data 4.Identify an approach to creating a data storage, backup, and security plan Module 4: Data Storage, Backup, and Security
Storage Personal computers Networked storage External storage Remote/cloud storage Physical storage Module 4: Data Storage, Backup, and Security
Backup Store 2 copies Set up a backup routine Digital surrogates Test your system Module 4: Data Storage, Backup, and Security
A Word of Caution Module 4: Data Storage, Backup, and Security ≠
Other Considerations File formatting Data migration Responsibility Module 4: Data Storage, Backup, and Security
Security Access Systems Integrity Module 4: Data Storage, Backup, and Security
Protecting Access Login credentials Centralized systems Role-based rights Limitations of wireless devices Module 4: Data Storage, Backup, and Security
Protecting Computer Systems Anti-virus software Up-to-date software Firewalls Intrusion detection software Physical access Module 4: Data Storage, Backup, and Security
Ensuring Data Integrity Encryption Electronic signatures Watermarks Module 4: Data Storage, Backup, and Security
UT UT's Office of Information Technology provides you with services to help ensure the safety and security of you research data. The following services can be utilized by all UTK researchers: Vault: share large amount of data and send messages to project collaborators securely. (vault.utk.edu) TrueCrypt: Free on-the-fly software and file encryption. Identify Finder: Prevent identity fraud by ensuring sensitive information is not easily accessible. 2-Factor Authentication Crashplan: cloud-based backup service Contact Bob Hillhouse for more information on the preceding services at or Module 4: Data Storage, Backup, and Security
Activity Read through the Data Storage, Backup, and Security checklist and think of how you would accommodate some of the items in your projects. Discuss among yourselves. Module 4: Data Storage, Backup, and Security