Skip to Main Content
George Mason University | University Libraries
See Updates and FAQs for the latest library services updates. Subject Librarians are available for online appointments, and Virtual Reference has extended hours.

Research Data Management Basics

This guide covers essential and practical tips for managing project data and lists contacts for getting help with data questions.

When storing files it is important to be aware of any access and security considerations.

Consult university Storage Requirements by Data Classification to determine where to store your data based on its classification (highly sensitive data, restricted data, public use data).

Storage options at George Mason

 

Keep three (3) copies of important files. 

For example:   

  1. One primary file on your computer,   
  2. a second copy backed up to an external hard drive or other media,  
  3. a third copy off-site.          

Determine what data will be backed up and the backup schedule.

Questions to consider:

  • Is there a backup service already available or will you need to do it yourself?
  • How often will backups occur?
  • Who will be responsible for performing backups?
  • How will sensitive data be backed up?
  • Do you have sufficient storage or will you need to include costs for backup hardware and software?

More Information:

3-2-1 Backup Before It's Too Late (GradHacker)
Data Backup Options (US-CERT)

Backup Utilities

When working with sensitive data, IT security practices must be followed. George Mason's IT Security Office has published guidelines and policies.

Please review George Mason's policies and procedures carefully.

Basic security guidelines:

  • Network Security
    • Keep highly sensitive data off the Internet.
    • Put sensitive materials on computers not connected to the Internet.
  • Physical Security
    • Restrict access to buildings and rooms where computers or media are kept.
    • Only let trusted individuals troubleshoot computer problems.
  • Computer Systems & Files
    • Virus protection software should be used and be regularly updated.
    • Don't send confidential data via e-mail or through other file transfer modes.
    • Use passwords on files and on computers.
    • Use encryption if needed.