Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

Our Data Storage Finder serves as a helpful guide to assist you in finding the most suitable IT solutions for storing and managing data according to your specific needs. Simply click on a solution to access further details. Should you require additional information, we kindly encourage you to reach out to our ICT Service desk or Research Data Management Support.

Question

Answer

Storage options

  1. Would you like to share your research data with colleagues?

When you share your data, you allow certain individuals to access it. Access can be granted by you or an administrator, depending on the storage solution. More information regarding access rights can be found in the solution's details.

Yes, with individuals affiliated with the university.

Yes, with individuals not affiliated with the university.

No

Filter by label

There are no items with the selected labels at this time.

2. Does your data exceed 1 TB in total?

One terabyte can hold approximately 330,000 photos, assuming each photo is 3 megabytes in size, or over 35 hours of 1080p video files. For comparison, the Hubble Space Telescope generates 10 terabytes of data per year (as of 2018).

Yes

Filter by label

There are no items with the selected labels at this time.

No

Filter by label

There are no items with the selected labels at this time.

3. How would you classify your data's INTEGRITY?

If the data in your research were to be inaccurate, what would be the resulting impact?

There are four categories in which the potential impact can be classified:

  • Low: Erroneous data could cause inconvenience and necessitate additional effort.

  • Basic: Inaccurate data could render the research invalid and necessitate significant revisions.

  • Sensitive: Inaccurate data may harm various research projects, harm the reputation of the researcher and university, and breach significant contracts.

  • Critical: Using inaccurate information may result in significant contractual obligations, exclusion from future grants, or even pose a risk to vital research efforts.

Leiden University suggests that research data should be classified to assess its value and potential security risks. This is an important aspect of registering processing activities, whether they involve personal information or not. For further information, please refer to the following URL.

Low

Basic

Sensitive

Critical

4. How would you classify your data's CONFIDENTIALITY?

What are the consequences of unauthorized data access or leaks?

Additionally, the Handling Personal Data guide provides information on how to manage personal data throughout the research process.

There are four categories in which the potential impact can be classified:

  • Low: Short term interruption, mainly data that is already public or is not sensitive

  • Basic: Non-Public research data, long term interruption or invalidation of research, personal data of moderate amount of individuals or sensitive personal data of small number of individuals.

  • Sensitive: Publication restrictions, reputation damage to researcher and university, patients or contractual agreements, sensitive personal data of moderate amount of individuals or non-sensitive personal data or large number of individuals.

  • Critical: Far reaching contractual obligations, exclusion from future grants of life-threatening research, highly sensitive personal data of individuals or personal data of huge number of individuals.

Leiden University suggests that research data should be classified to assess its value and potential security risks. This is an important aspect of registering processing activities, whether they involve personal information or not. For further information, please refer to the following URL.

Low

Basic

Sensitive

Critical

5. How would you classify your data's AVAILABILITY?

Data availability means both retaining data wherever it's stored and being able to use it when the services for processing it function as intended. What happens if the data is lost or inaccessible for an extended period (days/weeks)?

There are four categories in which the potential impact can be classified:

  • Low: Not being able to access the data or losing them would be inconvenient, lead to rework.

  • Basic: Losing the data would invalidate research and/or require significant rework. Not having access to the data would cause significant delays and could incur costs up to 250,000 Euro.

  • Sensitive: Data loss or restricted access could halt research, damage reputation, violate contracts, and compromise personal data.

  • Critical: Incorrect data could have far-reaching contractual obligations, cause damages in excess of 1,500,000 Euro, including exclusion from future grants or losing/not being able to access potentially life-threatening data.

Leiden University suggests that research data should be classified to assess its value and potential security risks. This is an important aspect of registering processing activities, whether they involve personal information or not. For further information, please refer to the following URL.

Low

Basic

Sensitive

Critical

6. Would you like to access earlier data versions?

Some storage solutions allow you to access previous versions of the data yourself. In some cases, you need the administrator to ask for previous versions.

Yes

Filter by label

There are no items with the selected labels at this time.

No

Filter by label

There are no items with the selected labels at this time.

7. Do your performance needs to require special accommodations?

The more data and the more it is divided in files and directories, the more performance you require from the storage solution.

In two years, I will probably accumulate over 1,000 files in a single directory.

My data interactions require fast transaction or transfer rates.

No, performance is not an issue

8. What's your preferred data access method?

From a browser, anywhere (https)

Windows network drive (CIFS)

Linux NFS

Webdav

  • No labels