Download Data Management Plan Section I. Types of Data Data produced as a

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
Transcript
Data Management Plan
Section I. Types of Data
Data produced as a result of the proposed project is expected to include publications, research posters,
collaborative material such as a wiki or training materials, system data (which also includes user's usage
history on the resource - the number of jobs run, the number of service units charged, the account the
service units were charged to, the wall-time used executing the jobs, and the total time jobs waited to
execute), and temporary data created during the execution of the project. Text documents including
technical papers, theses, posters, and software documentation are expected to include figures in the form
of tables and graphs. Further, research data in various scientific domain fields is expected to be produced
by this system in the form of data sets, visualization sets, and other outputs. However, publication,
dissemination, or release of these results or data sets will be the responsibility of the individual researcher.
Resources can be provided by the members to assist researchers in publishing their data or results in
appropriate formats.
Section II. Data and Metadata Standards
Textual/graphical documents will be made available in at least one of the following formats: plain text,
PDF, HTML, MS Word, LaTeX due to their widespread use in business and academia.
Section III. Policies for access and sharing and provisions for appropriate protection privacy
Access to, sharing, and distributing of documents will be via web sites both locally and through the
XSEDE User Portal (XUP) and publishing in conferences, journals, and monographs. Clemson University
and the XUP/XDMoD will be the primary sites for storing and disseminating results of the proposed
project. Documents will be made available as soon as they are published or otherwise released but in no
case more than 6 months after created. The original author of each document or his or her institution will
retain ownership of the IP. See Section V for details on facilities provided for distributing and protecting
the data.
Ethical and privacy issues are not anticipated in this project.
Section IV. Policies and provisions for re-use, re-distribution
All data is expected to be reusable and redistributable with proper attribution to the authors. Published
papers will typically have copyrights as required by the publisher.
Section V. Plans for Archiving and Preservation of access
These data elements will be maintained for the required minimum of 3 years, or longer as demand
dictates. In the event one or more of the PIs/application leads leave Clemson or one of the partner
universities prior to this time the data will be moved to the relocating PI's new institution, and/or the
original institution will maintain the data for the required duration.
Data will be stored and archived utilizing the university’s central data center storage resources. Data
storage will be under the protection of Clemson and will be modifiable only through a valid login ID that
utilizes strong password requirements. Data encryption and host-based firewalls are available. The
proposed system provides a rich set of storage capabilities that enable the user community to deploy
diverse data plans that are appropriate to their research. The local high performance parallel file systems,
block storage for VM environments and home directories are all connected to both archive nodes.
Researchers can keep their data on long-term tape backed up storage at two sites. When a file is migrated
to tape two copes are made on different tapes. Files can be at one site or two at the request of the
researcher. The VM environment can be used to deploy storage gateways that link storage in the system
with external sites for ingest of new data and exporting of existing data.
The data center is staffed by CCIT on a 24-hour basis from a state of the art network operations center
1
within the ITC.
Clemson’s data storage systems are monitored in Clemson’s Network Operations Center (NOC). The
NOC utilizes cutting edge technology, equipment, and monitoring tools to proactively monitor the
network infrastructure and critical computing systems and services provided by the university
community, overseeing functionality, capacity and performance. The NOC operates 24x7x365 to provide
top-level support and customer service to the university's research and academic communities and our
affiliated partners.
The data centers are physically protected by 24-7 surveillance cameras that are actively monitored and
recorded. Monitoring of security anomalies is done via but not limited to Security Incident and Event
Management based solutions with auto-reporting to the NOC and Clemson’s security team should an
event occur. Access to the facility is protected by card access with a role-based scheme as to
authorization. Additional layers of access are afforded to the machine room in which personnel have to
demonstrate need, and participate in proper training that is renewed annually on applicable state and
federal regulations (i.e., HIPAA, FERPA, FPPA, etc.).
2