{"id":280,"date":"2025-11-27T14:04:57","date_gmt":"2025-11-27T19:04:57","guid":{"rendered":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/?post_type=chapter&#038;p=280"},"modified":"2026-03-01T23:26:49","modified_gmt":"2026-03-02T04:26:49","slug":"activity-4-1-reflection","status":"publish","type":"chapter","link":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/activity-4-1-reflection\/","title":{"raw":"Activity 4.1: Reflection","rendered":"Activity 4.1: Reflection"},"content":{"raw":"<h4><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/destroy-data\/\">Previous Lesson<\/a><\/h4>\r\n<h4><img class=\"wp-image-692 aligncenter\" src=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/10\/Untitled-design-1-300x200.png\" alt=\"\" width=\"1124\" height=\"749\" \/><\/h4>\r\n<h4>Lesson 16 of 18<\/h4>\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\"><strong>This module covered:<\/strong><\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li>An introduction to ways to safeguard your data. It reviewed three types of safeguards:\r\n<ul>\r\n \t<li>Physical safeguards<\/li>\r\n \t<li>Administrative safeguards<\/li>\r\n \t<li>Technical safeguards<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\nSecurely storing and backing up your data is an important part of research data management that helps you to address risks to your ability to complete your project (i.e., by protecting against loss), and to address risks to any research participants or personally identifiable information (i.e., by adequately protecting the data from hacking and bad actors).\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"textbox textbox--exercises\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\"><strong>With your own research project in mind respond to the following prompts:<\/strong><\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li>Investigate your local institution\u2019s IT and research computing offerings. What is available to you and is it suitable for your project?<\/li>\r\n \t<li>Investigate your institution\u2019s research and IT policies. Does your institution have a classification for sensitive data?\r\n<ul>\r\n \t<li>If you have human participant data, you could also review guidance provided by your research office or research ethics board.<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li>Consider physical, administrative, and technical safeguards. What are some safeguards you could use to protect your data?<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<div class=\"textbox textbox--examples\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\"><strong>If you do not have a research project in mind, download either:<\/strong><\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<div class=\"textbox shaded\">\r\n<p style=\"text-align: center\"><em>Data Management Plan for Computational Reproducibility in High-Performance Computing (HPC)\u00a0<\/em>exemplar (Zhiang, 2020)<\/p>\r\n<p style=\"text-align: center\"><a href=\"https:\/\/doi.org\/10.5281\/zenodo.4062486\" target=\"_blank\" rel=\"noopener\"><strong>GO TO DOWNLOAD<\/strong><\/a><\/p>\r\n\r\n<\/div>\r\n<div class=\"textbox shaded\">\r\n<p style=\"text-align: center\"><em>Data Management Plan for People, Places, Policies and Prospects: Affordable Rental Housing for Those in Greatest Need<\/em>\u00a0exemplar (Leviten-Reid, 2020)<\/p>\r\n<p style=\"text-align: center\"><a href=\"https:\/\/doi.org\/10.5281\/zenodo.4062466\" target=\"_blank\" rel=\"noopener\"><strong>GO TO DOWNLOAD<\/strong><\/a><\/p>\r\n\r\n<\/div>\r\nExamine the type of data the author is collecting and their plans for data storage and backup, then assume you want to conduct a similar study and respond to the following prompts:\r\n<ul>\r\n \t<li>Investigate your local institution\u2019s IT and research computing offerings. What is available to you and is it suitable for your project?<\/li>\r\n \t<li>Investigate your institution\u2019s research and IT policies. Does your institution have a classification for sensitive data?\r\n<ul>\r\n \t<li>If you have human participant data, you could also review guidance provided by your research office or research ethics board.<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li>Consider physical, administrative, and technical safeguards. What are some safeguards that the exemplar author used to protect their data? Would you implement similar safeguards?<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<h4><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/quiz-4\/\">Next Lesson<\/a><\/h4>","rendered":"<h4><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/destroy-data\/\">Previous Lesson<\/a><\/h4>\n<h4><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-692 aligncenter\" src=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/10\/Untitled-design-1-300x200.png\" alt=\"\" width=\"1124\" height=\"749\" srcset=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/10\/Untitled-design-1-300x200.png 300w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/10\/Untitled-design-1-1024x681.png 1024w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/10\/Untitled-design-1-768x511.png 768w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/10\/Untitled-design-1-1536x1022.png 1536w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/10\/Untitled-design-1-65x43.png 65w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/10\/Untitled-design-1-225x150.png 225w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/10\/Untitled-design-1-350x233.png 350w, https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-content\/uploads\/sites\/2528\/2025\/10\/Untitled-design-1.png 1693w\" sizes=\"auto, (max-width: 1124px) 100vw, 1124px\" \/><\/h4>\n<h4>Lesson 16 of 18<\/h4>\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\"><strong>This module covered:<\/strong><\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li>An introduction to ways to safeguard your data. It reviewed three types of safeguards:\n<ul>\n<li>Physical safeguards<\/li>\n<li>Administrative safeguards<\/li>\n<li>Technical safeguards<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Securely storing and backing up your data is an important part of research data management that helps you to address risks to your ability to complete your project (i.e., by protecting against loss), and to address risks to any research participants or personally identifiable information (i.e., by adequately protecting the data from hacking and bad actors).<\/p>\n<\/div>\n<\/div>\n<div class=\"textbox textbox--exercises\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\"><strong>With your own research project in mind respond to the following prompts:<\/strong><\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li>Investigate your local institution\u2019s IT and research computing offerings. What is available to you and is it suitable for your project?<\/li>\n<li>Investigate your institution\u2019s research and IT policies. Does your institution have a classification for sensitive data?\n<ul>\n<li>If you have human participant data, you could also review guidance provided by your research office or research ethics board.<\/li>\n<\/ul>\n<\/li>\n<li>Consider physical, administrative, and technical safeguards. What are some safeguards you could use to protect your data?<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox textbox--examples\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\"><strong>If you do not have a research project in mind, download either:<\/strong><\/p>\n<\/header>\n<div class=\"textbox__content\">\n<div class=\"textbox shaded\">\n<p style=\"text-align: center\"><em>Data Management Plan for Computational Reproducibility in High-Performance Computing (HPC)\u00a0<\/em>exemplar (Zhiang, 2020)<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/doi.org\/10.5281\/zenodo.4062486\" target=\"_blank\" rel=\"noopener\"><strong>GO TO DOWNLOAD<\/strong><\/a><\/p>\n<\/div>\n<div class=\"textbox shaded\">\n<p style=\"text-align: center\"><em>Data Management Plan for People, Places, Policies and Prospects: Affordable Rental Housing for Those in Greatest Need<\/em>\u00a0exemplar (Leviten-Reid, 2020)<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/doi.org\/10.5281\/zenodo.4062466\" target=\"_blank\" rel=\"noopener\"><strong>GO TO DOWNLOAD<\/strong><\/a><\/p>\n<\/div>\n<p>Examine the type of data the author is collecting and their plans for data storage and backup, then assume you want to conduct a similar study and respond to the following prompts:<\/p>\n<ul>\n<li>Investigate your local institution\u2019s IT and research computing offerings. What is available to you and is it suitable for your project?<\/li>\n<li>Investigate your institution\u2019s research and IT policies. Does your institution have a classification for sensitive data?\n<ul>\n<li>If you have human participant data, you could also review guidance provided by your research office or research ethics board.<\/li>\n<\/ul>\n<\/li>\n<li>Consider physical, administrative, and technical safeguards. What are some safeguards that the exemplar author used to protect their data? Would you implement similar safeguards?<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<h4><a href=\"https:\/\/pressbooks.bccampus.ca\/rdmoer\/chapter\/quiz-4\/\">Next Lesson<\/a><\/h4>\n","protected":false},"author":2543,"menu_order":16,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-280","chapter","type-chapter","status-publish","hentry"],"part":248,"_links":{"self":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters\/280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/users\/2543"}],"version-history":[{"count":8,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters\/280\/revisions"}],"predecessor-version":[{"id":795,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters\/280\/revisions\/795"}],"part":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/parts\/248"}],"metadata":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapters\/280\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/media?parent=280"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/pressbooks\/v2\/chapter-type?post=280"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/contributor?post=280"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/rdmoer\/wp-json\/wp\/v2\/license?post=280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}