RESEARCH DATA STORAGE AND PRESERVATION Sample Clauses

RESEARCH DATA STORAGE AND PRESERVATION. 3.1. Data organization and labelling a) Chemical data and procedures followed. These will be linked with the lab notebook number and page number where details of the experiment are recorded (likewise, file names/locations of analytical readings will also be recorded in lab notebooks to allow electronic records to be easily linked to the raw data); b) A PowerPoint report with details of all the analysis performed for each experiment and main results obtained, including on which instrument, which student(s) were in control of the experiment, exact dates, and directories on computers where the raw data is stored to allow the corresponding raw data records to be easily found; c) Published references related to the experiment. Files and folders will have an appropriately descriptive title/name. As QuIET is a large project involving large research institutions and well-established teams which already have advanced data-policies, workflows and naming conventions established, it is not reasonable to apply a one-model-fits-all approach. Therefore, all partners have come to an agreement to use a set of essential minimum information (Including project, WP, date, institution, experiment description) which shall ensure cross platform coherence. The final datasets decided to be deposited in the chosen data repository (see details in section 4) will also be accompanied by a README file listing the contents of the files and outlining the structure and file-naming convention used for potential users to easily understand the database itself. In such way, we will ensure a high quality, standardized and traceable workflow throughout the data generation process complying with the Findable and Interoperable principles of the EC for data management1. For Accessibility, Use and Re-use, please refer to section 4 of this document.

Related to RESEARCH DATA STORAGE AND PRESERVATION

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇-▇▇▇▇▇.▇▇▇/508.htm.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.