A Capability Maturity Model for Research Data Management
CMM for RDM » 5. Repository Services and Preservation » 5.3 Activities Performed

Changes for document 5.3 Activities Performed

Last modified by crowston on 2014/06/01 12:07
From version 17.4
edited by Arden Kirkland
on 2014/03/14 14:53
To version 18.1
edited by Arden Kirkland
on 2014/03/14 15:00
Change comment: fixed anchors

Content changes

... ... @@ -8,26 +8,26 @@
8 8
9 9 == 5.3.1 Store data ==
10 10
11 -A key function in data management is storing the data both for current use and for long-term archiving. Earlier sections discussed logical formats for data storage; in this section, we focus on physical storage. All storage devices, locations and access accounts should be documented and accessible to team members ([[DataONE, 2011a>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#DataONE-a]]). Data should be stored in non-proprietary hardware formats ([[Borer et al., 2009>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#Borer]]) so that they can be read even if the original hardware is not available. Media should be handled and stored carefully ([[DataONE, 2011d>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#DataONE-d]]). Data discs should be routinely inspected and replaced as needed ([[DataONE, 2011d>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#DataONE-d]]). Storing data solely on local hard drives or servers is not recommended ([[DataONE, 2011e>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#DataONE-e]]): keeping multiple copies of the data files in separate locations is safer ([[DataONE, 2011e>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#DataONE-e]]).
11 +A key function in data management is storing the data both for current use and for long-term archiving. Earlier sections discussed logical formats for data storage; in this section, we focus on physical storage. All storage devices, locations and access accounts should be documented and accessible to team members ([[DataONE, 2011a>>||anchor="DataONE-a"]]). Data should be stored in non-proprietary hardware formats ([[Borer et al., 2009>>||anchor="Borer"]]) so that they can be read even if the original hardware is not available. Media should be handled and stored carefully ([[DataONE, 2011d>>||anchor="DataONE-d"]]). Data discs should be routinely inspected and replaced as needed ([[DataONE, 2011d>>||anchor="DataONE-d"]]). Storing data solely on local hard drives or servers is not recommended ([[DataONE, 2011e>>||anchor="DataONE-e"]]): keeping multiple copies of the data files in separate locations is safer ([[DataONE, 2011e>>||anchor="DataONE-e"]]).
12 12
13 13 == 5.3.2 Provide data security ==
14 14
15 -Confidential data has to be stored in such a way that access cannot be available ([[Columbia Center for New Media Teaching and Learning, n.d.>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#Columbia]]). Data should be secured in accordance with developed data access polices.
15 +Confidential data has to be stored in such a way that access cannot be available ([[Columbia Center for New Media Teaching and Learning, n.d.>>||anchor="Columbia"]]). Data should be secured in accordance with developed data access polices.
16 16
17 17
18 18 == 5.3.3 Control changes to data files ==
19 19
20 -The original data set should be preserved in its original state ([[Borer et al., 2009>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#Borer]]; [[DataONE, 2011f>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#DataONE-f]]; [[Hook et al., 2010>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#Hook]]). Unaltered images should be preserved at the highest resolution possible. ([[DataONE, 2011e>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#DataONE-e]]).
20 +The original data set should be preserved in its original state ([[Borer et al., 2009>>||anchor="Borer"]]; [[DataONE, 2011f>>||anchor="DataONE-f"]]; [[Hook et al., 2010>>||anchor="Hook"]]). Unaltered images should be preserved at the highest resolution possible. ([[DataONE, 2011e>>||anchor="DataONE-e"]]).
21 21
22 -Changes to data files should be controlled, that is, appropriate tools, such as version control tools, should be used to keep track of the history of changes to the data files ([[Hook et al., 2010>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#Hook]]). Changes should be made only by users authorized by the developed data access policies. The nature of and reasons for the changes recorded. In particular, users should be aware of, and document, any changes in the coding scheme ([[Hook et al., 2010>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#Hook]]). A further danger of using applications such as spreadsheets to store data is that these programs are designed to facilitate making changes to the data, while for scientific data, changes should be controlled.
22 +Changes to data files should be controlled, that is, appropriate tools, such as version control tools, should be used to keep track of the history of changes to the data files ([[Hook et al., 2010>>||anchor="Hook"]]). Changes should be made only by users authorized by the developed data access policies. The nature of and reasons for the changes recorded. In particular, users should be aware of, and document, any changes in the coding scheme ([[Hook et al., 2010>>||anchor="Hook"]]). A further danger of using applications such as spreadsheets to store data is that these programs are designed to facilitate making changes to the data, while for scientific data, changes should be controlled.
23 23
24 24 It may be appropriate to provide multiple versions of data products with defined identifiers for unambiguous reference, reflecting the state of the data at different points in time ([[DataONE, 2011g>>||anchor="DataONE-g"]]).\\
25 25
26 26 == 5.3.4 Backup data ==
27 27
28 -Data, processing codes, and documentation should be regularly backed up ([[Hook et al., 2010>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#Hook]]) according to the defined procedures to ensure that there are at least two (and preferably more) copies of all important data. Backup devices should be selected for and regularly checked for reliability. Backups should be regularly tested for completeness and correctness to ensure that backup copies have the same content as the original data file ([[DataONE, 2011c>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#DataONE-c]]). The backups should also be checked to ensure that they are secure and and that only those who need access to backups have proper access ([[DataONE, 2011c>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#DataONE-c]]). Contact information should be available for the persons responsible for the backed up data ([[DataONE, 2011c>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#DataONE-c]]).
28 +Data, processing codes, and documentation should be regularly backed up ([[Hook et al., 2010>>||anchor="Hook"]]) according to the defined procedures to ensure that there are at least two (and preferably more) copies of all important data. Backup devices should be selected for and regularly checked for reliability. Backups should be regularly tested for completeness and correctness to ensure that backup copies have the same content as the original data file ([[DataONE, 2011c>>||anchor="DataONE-c"]]). The backups should also be checked to ensure that they are secure and and that only those who need access to backups have proper access ([[DataONE, 2011c>>||anchor="DataONE-c"]]). Contact information should be available for the persons responsible for the backed up data ([[DataONE, 2011c>>||anchor="DataONE-c"]]).
29 29
30 -A copy of the backup should be kept at a trusted off-site location ([[DataONE, 2011b>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#DataONE-b]]). As well, keeping backup copies of data off-line will help ensure that they will are not affected by any system problems or software errors that damage the primary copy ([[Borer et al., 2009>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#Borer]]). Copies of physical data stores such as lab notebooks and samples should also be regularly stored off-site for safe keeping ([[Columbia Center for New Media Teaching and Learning, n.d.>>url:http://rdm.ischool.syr.edu/xwiki/resources/js/xwiki/wysiwyg/xwe/69418DB5FB08918068E66A3255D5BA3F.cache.html#Columbia]]).
30 +A copy of the backup should be kept at a trusted off-site location ([[DataONE, 2011b>>||anchor="DataONE-b"]]). As well, keeping backup copies of data off-line will help ensure that they will are not affected by any system problems or software errors that damage the primary copy ([[Borer et al., 2009>>||anchor="Borer"]]). Copies of physical data stores such as lab notebooks and samples should also be regularly stored off-site for safe keeping ([[Columbia Center for New Media Teaching and Learning, n.d.>>||anchor="Columbia"]]).
31 31
32 32 == 5.3.5 Curate data ==
33 33

XWiki Enterprise 5.1-milestone-1 - Documentation