Report an accessibility problem

Ira A. Fulton Schools of Engineering | Engineering Technical Services

Select Page

Research Data (Storage)

Research Computing Scratch

Research Computing Scratch is dedicated for only temporary storage. This space is generally used for programs that cause overflow where there is insufficient RAM. It cannot be used to permanently back up files. The data on a scratch disk can be erased dynamically or on a periodic basis.

Below are links to more information about Research Computing and Scratch Spaces:

https://cores.research.asu.edu/research-computing/about-rc

Policies and other information about Scratch space:

https://cores.research.asu.edu/research-computing/policies

Library (Data Management Plans)

The ASU library Research Data Management page provides extensive resources for ASU faculty and student Researchers. Win more awards with the Data Management Plan tool which allows users to create their own personalized Data Management Plan that fits to their needs.

Link to Library Research Data Management Page:

https://libguides.asu.edu/data/start

Link to Data Management Plan too/tutorial:

https://libguides.asu.edu/data/start/dmptool#s-lg-box-9671486

 

Compliant Data Storage - Data Handling Matrix

Arizona State University staff and faculty routinely handle sensitive information including Personally Identifiable Information (PII), Student Records, Health Records, Financial Records, and Research Data. As part of its program to ensure that safe measures protect PII and other sensitive data in a robust and least intrusive manner, ASU provides requirements for encrypting data in transit and storage. Devices should comply with minimum hardware and software requirements for ASU-sanctioned FDE solutions.┬áIf a device cannot be encrypted because its operating system is obsolete, the device should be upgraded to a current operating system. If a device lacks the recommended hardware (e.g., minimum system requirements for compliant operating system, chipset including compliant TPM chip), the device should be upgraded or replaced with a compliant device. Below are links to resources regarding Compliant Data Storage – Data Handling Matrix.

Information Technology Policies:

https://uto.asu.edu/security-policies/policy

Guidelines and Procedures:

https://getprotected.asu.edu/content/guidelines-procedures

Device and Data Encryption:

https://getprotected.asu.edu/content/device-data-encryption

OneDrive, Dropbox, and Google Drive are all cloud storage services offered here at ASU. Each of these services are tied to the ASU Directory, offer sharing of files to accounts outside of ASU. More information about Cloud Storage and how DropBox, OneDrive, and Google Drive play a role can be found here.