JHU Policy | It is requires that faculty must keep original research data at least five years after any publication on which it is based. | https://publichealth.jhu.edu/sites/default/files/2022-05/data-retention-guidelines-9122019.pdf |
Johns Hopkins Medicine | The Principal Investigator (PI) of a study approved by a JHM IRB is required to retain records associated with a human subjects research project pursuant to Organization Policy 115.2. The recordkeeping requirements vary depending on whether federal funding was provided for the project, whether there is funding from industry with contractual provisions governing data retention, or whether the study was conducted under FDA regulations. | |
NIH Grants | Recipients generally must retain financial and programmatic records, supporting documents, statistical records, and all other records that are required by the terms of a grant, or may reasonably be considered pertinent to a grant, for a period of 3 years from the date the annual FFR is submitted. | https://grants.nih.gov/grants/policy/nihgps/html5/section_8/8.4.2_record_retention_and_access.htm |
Paper Destruction | Shredding and disposal services are available from companies such as Shred-it and there are disposal boxes located through the School. Should you wish to engage either company with your specific project, particularly if it is high volume, contact your departmental administrator. | Iron Mountain provides boxes for long-term, fee-based storage at its facilities: |
Electronic Media and Hardware Destruction | There are specific ways to effectively destroy CD/DVDs, hard drives, flash drives, etc. The JHSPH Information Technology office can assist in proper disposal of media and hardware through recycling at no cost to faculty members. | https://www.jhsph.edu/sustainability/electronic-hardware-recycling-faqs |
Digital Data Destruction | You can use a variety of safe “erase” methods for data files on your personal computer or laptop. If you have software for encrypting files and file folders, (e.g., VeraCrypt), you can encrypt those files and then delete them rendering the files useless even if recovered. | Other suggestions include: PCs: www.pcworld.com/article/2464163 www.pcworld.com/article/209418 Macs: |