Since digital data is easily lost, digital files are fragile, and formats and storage media become obsolete over time, you will need to decide where and how you will store your data in the active phase of your research so that it is readily accessible to you but also secure.
For medium- to high-risk data, details of data storage (including location, 3rd party terms of use, access and security) should be specified in the Informed Consent materials available from the Research Ethics Board (SREB).
Consider how much storage space will be required, any associated costs, and how long the data will be stored. Also, consider data type, file versioning, backups and data growth while estimating required storage space. Keep in mind:
Contact IT Services for more information and to discuss your options.
In general, researchers conducting Sheridan-supported research projects should store their digital data on Sheridan servers through SharePoint. SharePoint is a commercial cloud service that is managed and appropriately secured by IT Services, offering safe and convenient sharing capabilities. Storage platforms offered through IT Services (e.g., SharePoint) are required for externally-funded projects, curriculum-based or other unfunded Sheridan projects, as well as any project using medium- to high-risk data.
Other IT-supported cloud services (e.g., OneDrive) may be used only for personal file storage for low-risk data where no collaboration is required. Avoid using IT cloud services other than SharePoint for medium- to high-risk data.
Third-party cloud storage services (e.g. Google Drive, DropBox) may be considered only if necessary, and only for low-risk data. Never use third-party cloud services for medium- to high-risk data as these are limited in terms of Sheridan oversight, support in the event of issues, and leverage over service levels. If Sheridan systems are not able to meet the needs of the research initiative, consult with IT Services to assess and recommend solutions. At minimum:
For staff and faculty pursuing their own individual research for personal gain (e.g., graduate studies), Sheridan resources should not be used, including Sheridan servers (e.g., SharePoint or OneDrive). Refer to the institution where you are pursuing your studies for directions on data storage.
Contact IT Services for recommendations and resources.
In general, storage devices should only be used as a backup of your research data set, not as the only copy of your dataset.
High-risk data should not be stored on any type of removable or mobile devices, including laptop hard drives, USBs, external hard drives, smart phones, tablets and external servers. In particular, smart devices that provide AI capabilities pose an increased risk of data being shared with a third party, thereby impacting data security.
IT-issued devices (e.g., laptops) may be used for personal file storage for low-risk data where no collaboration is required. Avoid using IT-issued devices for medium- to high-risk data, where possible.
Removable devices, such as small USB flash drives and external hard drives can be easily lost. Avoid using such devices for medium- and high-risk data, where possible. Where using a removable or mobile device is necessary:
Personal devices (e.g., laptops, smart phones, etc) may be used only for personal file storage for low-risk data where no collaboration is required. Never use personal storage for medium- and high-risk data or any externally-funded projects. Avoid using personal storage locations for curriculum-based or other unfunded Sheridan projects. In cases where it is unavoidable:
For staff and faculty pursuing their own individual research for personal gain (e.g., graduate studies), Sheridan resources should not be used, including Sheridan devices. Refer to the institution where you are pursuing your studies for directions on data storage.
Contact IT Services to identify available secure data storage solutions and resources.
When data is collected in physical formats, such as survey questionnaires, interview transcripts, etc., careful handling and storage of the physical materials is important. Transfer data to a secure storage location on campus as soon as practically feasible.
For medium- to high-risk data, any physical material or hardcopies containing sensitive data must be either stored in a secure, access-controlled location on-site at Sheridan College, or sent to archival, as soon as is practically feasible.
Data should be backed up on a regular, scheduled basis to protect from accidental data loss. Follow the LOCKSS principle (Lots of Copies Keep Stuff Safe). The best time to develop a backup strategy is at the beginning of your project.
A backup schedule should be set for regular intervals and when modifications are made to critical files. You will also need to test these backups at a regular time and make sure that the full data can be restored. Sheridan backs up data housed on its infrastructure automatically.
As part of your backup plan, identify:
Follow the 3-2-1 backup rule for data storage:
When using local storage on laptops, hard drives, thumb drives, etc. there is no Sheridan provided backup.