Information Technology Reference
In-Depth Information
Issues pertaining to data storage can vary according to technologies available,
technologies employed, discipline and even country. There might be require-
ments for how long data are stored, how these are stored, and who is responsi-
ble for storing these. For example, in Australia the Freedom of Information Act
suggests that institutions, not researchers, are responsible for long-term data
storage. As researchers consider data storage, they should be clear about access
being appropriately restricted and also decide on a format that will make it pos-
sible to access the data for years to come. In most cases, durability simply
implies using the newest storage technology. Current storage options might
include an online service, a local data server, a local hard drive, an external hard
drive, a removable disk, and a CD or DVD. All options, however, should include
a second option as a back-up solution.
Tips 'n tricks
Security tips
Use passwords that are difficult to break (e.g. a combination of alpha and
numeric characters).
“Portable” also means “easily stolen.”
Be sure file settings don't allow prying eyes.
Use a unique coding system for participant identifiers.
A basic way to protect a hard drive or personal account is to use password
protection. Use combinations of letters and numbers that make sense to
you, but are difficult for someone else to guess. For example, you might have
a cat named “Boots” and your car license plate number is “CV1779.” You
could use Boo779ts. Using numbers and letters makes a password difficult
to break. The catch is not to use something extremely obvious such as your
name and phone number. For example, a name and birthday combination
like Jo720hn might not be as secure as other combinations. In addition to
using a password, it's important to note that passwords need to be changed
periodically. Changing a password approximately every six months is good
practice.
If your computer is portable, consider the likelihood that it might get stolen
some day. In the past few years, there have been many cases in the news about
lost or stolen laptops that contained medical records, credit card information,
social security numbers and highly sensitive military information. While no
one plans to have their computer stolen, preparing for the possibility is worth-
while. If you must store sensitive data on a portable computer, files should be
encrypted.
Search WWH ::




Custom Search