• Enter what you want to find and click OK Search

Storing of data

You must cite this article if you use its information in other circumstances. An example of citing this article is:
Ronny Gunnarsson. Storing of data [in Science Network TV]. Available at: https://science-network.tv/storing-of-data/. Accessed March 19, 2024.
Suggested pre-reading What this web page adds
  1. Data collection
This web-page describes important considerations when considering what will happen to material collected in your research project. Reading this will give you a better understanding of what you need to consider and how to do it.

In many countries there is a requirement that original hard-copies and digital data files are stored for a number of years after completion of the project. Furthermore, many journals nowadays also require that data files are made public for any reader who wants to re-analyse data.

Important definitions

  • Identifiable: Data can be directly linked to an individual. The data set may contain names, addresses, date of birth or social security number.
  • Re-identifiable: The data set does not contain information enough to identify individual persons and link data to them. However, the data set contains some kind of identifier (could be a set of numbers or other random characters) that combined with a “key” (that can be another data file) can link each data set to an identifiable individual person.
  • Non-identifiable = anonymous: The data set does not contain information so individual persons can directly or indirectly be identified. It means there is no key that combined with other information can re-identify individual persons.

Please note that a data set that is intended to only contain anonymous data can accidentally have information that makes it possible to identify some individuals. An example can be visitor statistics at a hospital if postal code of patients is kept in the data set and some postal codes only have a few households.

Main problems with storing of research material

  1. During and after the research project ensuring that sensitive information, such as the health of individual persons, is not leaked outside the research group.
  2. During and after the research project ensure valuable information is not lost. This requires a backup strategy that is checked on a regular basis.
  3. Ensure that data is stored when the project is completed. Ideally sensitive information is kept secure but non sensitive information , such as a coded data file with no link to individuals, are made publicly available so other researchers can validate results.
  4. Ensure that data is stored in a way that it is possible to keep track of when research material that can be linked to individuals are up for destruction and where to find it when that happens.

A few practical tips:

  • It may not be legal to transfer data between different organisations. Rules differ between countries and regions and you may need to check what is acceptable in your circumstances. It is also likely that rules differ pending on if data are stored as identifiable, re-identifiable or non-identifiable.
  • CD and DVD discs may not be possible to read in the future. USB memory sticks tend to be corrupted and data may not be retrievable after a couple of years. Hence, avoid these if possible.
  • After a number of years when data are up for destruction please note that anonymous data should not be destroyed. In case of re-identifiable data only destroy the key linking the data set to individuals. If you have identifiable data try to make them anonymous and keep the anonymous data set.

Public storage for digital research data:

You must cite this article if you use its information in other circumstances. An example of citing this article is:
Ronny Gunnarsson. Storing of data [in Science Network TV]. Available at: https://science-network.tv/storing-of-data/. Accessed March 19, 2024.

Comments are closed.