Our Data Storage Finder serves as a helpful guide to assist you in finding the most suitable IT solutions for storing and managing data according to your specific needs. Simply click on a solution to access further details. Should you require additional information, we kindly encourage you to reach out to our ICT Service desk or Research Data Management Support.
Question | Answer | Storage options |
---|---|---|
When you share your data, you allow certain individuals to access it. Access can be granted by you or an administrator, depending on the storage solution. More information regarding access rights can be found in the solution's details. | Yes, with individuals affiliated with the university. |
|
Yes, with individuals not affiliated with the university. |
| |
No |
| |
2. Does your data exceed 1 TB in total? One terabyte can hold approximately 330,000 photos, assuming each photo is 3 megabytes in size, or over 35 hours of 1080p video files. For comparison, the Hubble Space Telescope generates 10 terabytes of data per year (as of 2018). | Yes |
|
No |
| |
3. How would you classify your data's INTEGRITY? If the data in your research were to be inaccurate, what would be the resulting impact? There are four categories in which the potential impact can be classified:
Leiden University suggests that research data should be classified to assess its value and potential security risks. This is an important aspect of registering processing activities, whether they involve personal information or not. For further information, please refer to the following URL. | Low |
|
Basic |
| |
Sensitive |
| |
Critical |
| |
4. How would you classify your data's CONFIDENTIALITY? What are the consequences of unauthorized data access or leaks? Additionally, the Handling Personal Data guide provides information on how to manage personal data throughout the research process. There are four categories in which the potential impact can be classified:
Leiden University suggests that research data should be classified to assess its value and potential security risks. This is an important aspect of registering processing activities, whether they involve personal information or not. For further information, please refer to the following URL. | Low |
|
Basic |
| |
Sensitive |
| |
Critical |
| |
5. How would you classify your data's AVAILABILITY? Data availability means both retaining data wherever it's stored and being able to use it when the services for processing it function as intended. What happens if the data is lost or inaccessible for an extended period (days/weeks)? There are four categories in which the potential impact can be classified:
Leiden University suggests that research data should be classified to assess its value and potential security risks. This is an important aspect of registering processing activities, whether they involve personal information or not. For further information, please refer to the following URL. | Low |
|
Basic |
| |
Sensitive |
| |
Critical |
| |
6. Would you like to access earlier data versions? Some storage solutions allow you to access previous versions of the data yourself. In some cases, you need the administrator to ask for previous versions. | Yes |
|
No |
| |
7. Do your performance needs to require special accommodations? The more data and the more it is divided in files and directories, the more performance you require from the storage solution. | In two years, I will probably accumulate over 1,000 files in a single directory. |
|
My data interactions require fast transaction or transfer rates. |
| |
No, performance is not an issue |
| |
8. What's your preferred data access method? | From a browser, anywhere (https) |
|
Windows network drive (CIFS) |
| |
Linux NFS |
| |
Webdav |
|