Computer Room

Research data management & sharingData storage

Storing research data at Strathclyde

The University offers a range of systems for storing and transferring data at Strathclyde. Find out about the storage systems and policies relevant to researchers at Strathclyde from the following links:
Computer training

Data storage & research data management

In order to ensure that data can be stored and reused in the long term, researchers should distinguish between active research data and completed research data, and should have distinct storage methods for each.

Active research data is data that is currently being used, or is planned to be used in the near future.

Completed research data is data that needs to be preserved in a particular state, as it is deemed to be valuable and worth retaining for reuse or to authenticate findings.

Strathcloud, Network Drives, SharePoint, and some departmental storage systems are appropriate for storing active research data, but they are not appropriate for storing completed research data. Completed research data should be stored in a data repository, where it will be professionally curated in the long-term. At Strathclyde, data can be deposited in Pure.

Typing on a laptop

Data security

Researchers should avoid:

  • External hard drives & USB sticks
  • 3rd party cloud storage
  • Local storage that is not backed-up

If any of these storage methods are unavoidable, researchers should use encryption to protect against unauthorised access to data. This is in line with the University's encryption policy.

Researchers should think carefully about their research processes, and consider what steps should be taken, beyond simply using a secure system for storing data at rest, to ensure data is stored and transferred securely throughout the research project. This might involve:

  • Using Strathcloud to send data to University storage when working off-campus
  • Using Strathcloud to send and recieve data to/from external collaborators or participants
  • Using encrypted external hard drives to back up data when no internet access is available
  • Choosing appropriate data collection locations to ensure sensitive data can be collected without breaching confidentiality
  • Anonymising data, or pseudo-anonymising data and storing the key code in a separate location to the data
  • Ensuring physical data is stored in secure locations and digitised where appropriate