Get advice
Stash Orientation Guide
More "how-to" help is available at the Stash Help Pages
What is a... ? | Why should I? | When should I? | |
---|---|---|---|
RDMP or Research Data Management Plan establishes a link between the project you are working on (even if informal) and your research data.
It can be edited only by the Data Manager and First Named Chief Investigator (FNCI) and can be viewed only by UTS collaborators you have added as Contributors.
|
|
Proposal stage: if you are planning a project that will create or compute data in very large volumes or will need specific data infrastructure (e.g. databases), contact us.
NB. "RDM info for grants and ethics" (scroll down) supplies suggestions for the data management section of your grant applications. Post-award stage: all other projects. | |
Workspace - a platform or service provided by UTS for you to store and manipulate data during a research project. |
|
Anytime you need one for research. | |
Data Record - a record of the research data, whether primary or processed, used to reach your research findings. It should include any documentation necessary to understand or reproduce your research, including code and any type of digital artefact. It can be edited only by the Data Manager and FNCI and can be viewed only by UTS collaborators you have added as Contributors. |
|
Best-practice varies by discipline, but consider creating a data record:
|
|
Data Publication - publications (usually on the UTS Research Data Portal and the ARDC’s Research Data Australia portal) of information about a set of research data that is available for re-use by other researchers (conditions may apply). A Data Publication may be Open Access (the data is available for download) or Mediated Access (access criteria apply). |
|
Anytime - your data publication can be embargoed to allow for your traditional outputs to be published first. | |
Data Steward is defined in the Data Governance Policy as a senior manager or director with stewardship responsibility for a data domain or sub-domain. |
|
When an FNCI leaves UTS, they should transfer responsibility for stewardship of the research data to the Associate Dean Research or Research Centre Director. | |
Data Manager is the person who manages collection, storage, access to, and use of, the research data. |
|
Before the Data Manager leaves a project, they should transfer responsibility for Data Management to the FNCI or their nominated representative. | |
Transfer of Responsibilities is available under the Manage menu. Transferal of responsibilities can only be done by the person who currently holds the responsibility, or by a system administrator. Transfer of responsibility revokes edit rights to the Stash records about the management of the data, but doesnt effect the data itself. |
|
Before the Data Manager or FNCI/Data Steward leaves a research project and/or UTS.
| |
Research data management (RDM) services at UTS are provided jointly by UTS ITD's eResearch team and UTS Library.
- UTS Library is responsible for providing training and consultation on RDM across the research project lifecycle.
- UTS eResearch are dedicated to helping researchers with research-specific tools, technology and training; a little like IML for researchers. eResearch provides researchers with a number of research platform services which meet the requirements of the UTS Research Policy and accompanying Research Data Management Procedure.
Research IT enquiries:
Grant applications
The ARC and NHMRC (among other funders) ask how you intend to manage your research data, and have recently made it clear that they are not looking for a generic response.However, if you manage your data throughout the research lifecycle using Stash, you will be able to state that your data is managed via an integrated data management system that ensures compliance with the Australian Code for the Responsible Conduct of Research. Stash also offers the ability to easily publish your data for reuse on the UTS Research Data website and Research Data Australia, whether openly or via mediated access.
Data with sensitivities
You may be required to provide information on how you will manage the security of your data. It is important to remember that data security is not just an IT issue but also needs to be addressed via well-developed data handling procedures (See the ABS explanation of the Five Safes Framework or contact eResearch for help). Below you will find some statements about UTS IT and Data security and an example of how these might be used for a Clinical Trials, Health or sensitive data application.UTS IT Security Management:
UTS has a policy directive covering IT security, based on the Information Technology — Security Techniques — Code of practice for information security management (AS/NZS ISO/IEC 27002:2006). This includes processes for the mandatory reporting of security breaches.UTS Data centres:
- applies to eResearch Store, LimeSurvey, Gitlab, Omero, Omeka and RedCap (which is stored in the offsite data centre only)UTS research data is stored in two high security data centres: one onsite at UTS, with multiple security doors and strictly limited keycard access, and the other, offsite in a secure 3rd party data centre, approved by UTS Legal and with certifications including ISO 27001, ASIO T4 "Intruder Resistant" and PCI DSS. In both data centres, storage devices are kept in secure racks where only a limited team of approved UTS administrators can access the rack contents.
Data Security
eResearch Store (aka 'Isilon') offers granular access control down to User account level. eResearch fileshares are accessible via the UTS secure network, protected by a firewall. From offsite they can be accessed only via VPN. On balance, eResearch Store is the safest location for your data as it will be securely managed for the entire retention period.eNotebooks (LabArchives) eNotebooks are hosted by LabArchives. LabArchives is a secure application on servers hosted at Amazon Web Services located in New South Wales. SSL certificates provide full-time HTTPS security for all User interactions with the application. LabArchives has successfully passed network and application security tests from multiple vendors. Each customer's data is stored in its own database, isolated from other customer data. Disk storage systems used for customer data utilise block-level "encryption at rest" via LUKS/AES/SHA256 and all backups of customer data reside only in an encrypted form. Access logs are monitored regularly for malicious or unusual traffic.
NB. Because eNotebooks keep an audit trail for IP Tracking purposes they shouldn't be used for data that must be deleted.