Introduction
ITS Encrypted Data Storage is intended for storage of research data. This data storage is fully encrypted, making it compliant with certain data standards.
Note: This Service is currently in an experimental Pilot Phase - and is now available for limited use by interested Researchers. Information and Policies are Subject to change.
Key Features
- End-to-End Encryption (At-Rest and Over-the-Wire)
- Accessible on Campus Internet or VPN
- Supports Mac, Windows, and Linux
- Stores extra copies of data, and retains snapshots of older data for a short time
Eligibility Criteria
To access ITS Encrypted Data Storage, individuals must meet specific criteria:
- Binghamton University Faculty or Staff OR Binghamton University Student with Faculty or Staff Sponsorship.
- Intended for Research Purposes only. Alternative data storage options available for non-research purposes.
- This storage is intended for Data Classified as Levels 1 - 3. Find more information on Data Levels at Binghamton University Data Classification Levels
Getting Started
Ready to utilize Encrypted Data Storage? Begin by REQUESTING ENCRYPTED RESEARCH STORAGE
Accessing Your Assigned Encrypted Data Storage
Managing Access to Your Encrypted Data Storage
Access is managed by the Administrators of the Share. If you requested the share, you are an Administrator by default, and can add other Administrators.
Anyone who is added as a Member of your Research Storage Group will be able to connect to the Research Storage
See Managing Access to Research Storage for more information on Administrators and Members.
Administrators have the ability to limit access to specific files or folders. See Managing File & Folder Perimissions for Research Storage for more information.
Changing Your Assigned Encrypted Data Storage
For changes related to storage size or access, email itsresearchsupport@binghamton.edu
Policies
- Snapshots of data are currently taken daily at Midnight. Snapshots are stored for 10 days. Your data will be recoverable if you contact ITS within 7 days of deletion.
- Only the original requester of the storage, or a designated point of contact can make recovery or modification requests.
- Refer to all policies outlined in the Eligibility section.
Contact and Support
For further assistance or queries, visit the Research Support Contact us Page.
Website Feedback
Encountered any website issues or have comments/questions? Please provide feedback here