Skip to main content
Li Ka Shing Library

Research Data Management: Data Security

Guide on research data management, with resources and tools for data planning, data organization, data documentation, data sharing, data security, data analysis and visualization

Data Security

Always consider security issues carefully when your data contains sensitive information such as identification and health information. 

  • Network Security: Store the data in a facility either connected to a secured network or disconnected to Internet.
  • Physical Security: Strictly control the access to the buildings in which facilities storing sensitive data are located.
  • Information Security: To enhance information security, encrypt the data sets before sending them to the storage facility.

Backup Datasets

Cloud based storage and synchronizing service

Use this option only when there is no sensitive information in the data set. A good strategy is to keep multiple copies of the back-ups using both a cloud based storage service and local hard drive.

Please contact us if you have tools to SUGGEST or you want to give us feedback about any of the options listed below. We appreciate your help to improve the quality of this guide.

                  

Encryption Tools

Consider these tools to encrypt your data files.

 

GNU Privacy Guard (GnuPG)
GnuPG
(Windows/Mac/Linux, Free)
Open source implementation of Pretty Good Privacy (PGP). Standard GnuPG is a command line tool. Graphic wrappers of GnuPG are listed here.

Disk Utility
Disk Utility
(Mac buildin, Free)
OS X buildin application. The icon is a screen shot of part of its interface.

TrueCrypt (recommended)
TrueCrypt
(Windows/Mac/Linux, Free)
An on-the-fly encryption tool. Once installed, files will automatically be decrypted when accessed, and encrypted when you no longer in use.

7-Zip
7-Zip
(Windows, Free)
Can be used as a lightweight encryption tool. Suitable for encrypting documents.

AxCrypt
AxCrypt
(Windows, Free)
Integrate with Windows shell. Provider right-click encryption/decryption functionality.

 

Source: Five Best File Encryption Tools from lifehacker.

Quick access to

Research data sources

Research and publishing support

Research grants

Ink (Institutional knowledge at SMU)

SMU wiki for SAS, STATA, SPSS

The use of electronic resources must comply with the Appropriate Use of Electronic Resources Policy and Singapore Management University Acceptable Use Policy