The document discusses data management principles of exposing, preserving, and protecting research data. It provides an overview of how various organizations like KMIS, RMG, and ICT can help with exposure, preservation, and protection of data. Metadata is important for data access, and there are various international metadata standards. Multiple backup strategies can help protect data from different levels of risk.
23. Backup Strategies Strategy 1 – Single copy on online storage Protects risk level 1 Strategy 2 – Additional copy on offsite storage Protects risk level 1 and 2 . Strategy 3 – Addition copy at a 3 rd location out-of-country. Protects risk level 1, 2 and 3 Strategy 4 – Multiple copies, frequency and retention period decided by the data owner Protects risks 1, 2, 3 and 4
Methodology for the effective management of information and data throughout its useful life
Quality - Explicit data validation procedures are used and documented throughout the research process. Efficiency - Data management procedures are designed to improve the efficiency of the research process. Exposure - Research data are in the public domain unless restrictions will serve our mission better (as per IP policy). The key concern here is the balance the rights of the data originator (i.e. getting credit for what he/she has done) with duty of the institution (i.e. getting the most value from the data, no matter who collected them). As a general rule we allow researchers exclusive use of it for up to 18 months. Preservation - Data generated from research activities are secured in long-term archives. It is possible to find what data have been generated and archived. Potential users are able to retrieve data in a usable format, subject to restrictions in Principle 3. Understandability - Sufficient information is linked to the data for potential users to decide if it meets their requirements. Ethics -. Confidentiality of data on human subjects is respected in accordance with national data protection acts (where they exist) and well established international standards.
The Triple-A Framework developed by the ICT-KM Program seeks to help CGIAR Centers/Programs and their scientists decide on the level of Availability, Accessibility and Applicability (AAA) they want for their research outputs, and also the pathways with which to turn these outputs into International Public Goods.
Isabelle to talk about folder structure on Central Storage Bruno to talk about SLP, Google Apps and CGXchange
Ask audience if they are ready for a disaster happening in their Centers – a disaster that would preclude them from using their critical IT systems support or even operating in their current location. It is a question that should guide every participant during the BCP workshop. The end objective of the workshop is really to increase awareness about the need of BCP among CGIAR key management staff.
Level 1 : a relatively small disaster that will not involve a change in location but will require data or resources to be restored. This type of disaster is usually covered by ICT Services through the incident management procedures. Level 2 : a more substantial disaster that affects most of the services hosted in the server room. A decision will need to be taken whether to set up a temporary server room on campus or at the disaster recovery site at ICRAF. Level 3 : a significant disaster that prevents services being provided from the main campus. This will require temporary services to be restored at the disaster recovery site at ICRAF. Level 4 : a major disaster that will involve relocation of the Centre and its staff to an alternative location in a different country
Strategy 1 – Low criticality to the operation of the Centre. Original data is stored on individual computers. A copy of the data is taken at scheduled times to local online storage. This protects against the risk 1. Strategy 2 – Medium criticality to the operation of the Centre. Original data is stored on individual computers, on servers or online locally and is usually owned by individuals, shared by groups, classed as Institutional information or application data. A copy of the data is replicated to the online remote storage. This protects against the risk 1 and 2. Strategy 3 – Medium criticality to the operation of the Centre. The original data is archived data that does not change and is stored online locally. A copy of the data can be made to transportable media and stored in a 3 rd location. This protects against risk 1, 2 and 3. Strategy 4 – High criticality to the operation of the Centre. The original data is stored on servers, online locally and is usually owned by individuals, shared by groups, classed as Institutional information or application data. One or more copies of the data are made online to the remote location. Copies of the data are also made to transportable media and stored in a 3 rd location. The frequency of the copies made and the length of time they will be kept for will be negotiated with the owner of the data. This protects against risks 1, 2, 3 and 4.