Computing or storage environment for research
Purpose
Choosing the correct location for your data will allow you to manage and protect your data to meet the requirements and expectations for your research project. The University provides a number of solutions.
Audience
researchers
On this page
Initial considerations
Determine your data's classification.
Classifying your data is the first step to knowing what safeguards are required to securely process or store your data.
Determine other project requirements.
A non-exhaustive list of requirements to consider when selecting a research environment include:
Legislative and/or regulatory obligations,
contractual and agreement obligations (e.g.; data share [DSA], material transfer [MTA]),
human ethics and animal use protocols,
research project stage,
backup requirements,
funding and cost limitations,
collaboration and sharing capabilities, and
space requirements.
What can I do?
Evaluate possible institutional options.
These systems are managed by technical experts at the University, divisional, or departmental level, allowing you to focus more on your research, rather than on maintaining the security of unmanaged systems.
Contact your local IT about what divisional or departmental options are viable for your research.
If institutional and divisional offerings are unsuitable, you may choose to manage your own systems.
Ensure that you meet the confidentiality, integrity, availability, and privacy requirements and expectations of your research project.
Search
Additional help
General
Contact us | Information Security (IS)
Contact us | Information Technology (IT)
Researchers
Research Information Security - Information Security at University of Toronto
Related articles
Â
Â
Â