JHU Policy

It is requires that faculty must keep original research data at least five years after any publication on which it is based.

https://publichealth.jhu.edu/sites/default/files/2022-05/data-retention-guidelines-9122019.pdf

Johns Hopkins Medicine

The Principal Investigator (PI) of a study approved by a JHM IRB is required to retain records associated with a human subjects research project pursuant to Organization Policy 115.2. The recordkeeping requirements vary depending on whether federal funding was provided for the project, whether there is funding from industry with contractual provisions governing data retention, or whether the study was conducted under FDA regulations.

https://www.hopkinsmedicine.org/institutional_review_board/guidelines_policies/guidelines/record_retention.html

NIH Grants

Recipients generally must retain financial and programmatic records, supporting documents, statistical records, and all other records that are required by the terms of a grant, or may reasonably be considered pertinent to a grant, for a period of 3 years from the date the annual FFR is submitted.

https://grants.nih.gov/grants/policy/nihgps/html5/section_8/8.4.2_record_retention_and_access.htm


Paper Destruction

Shredding and disposal services are available from companies such as Shred-it and there are disposal boxes located through the School. Should you wish to engage either company with your specific project, particularly if it is high volume, contact your departmental administrator.

Iron Mountain provides boxes for long-term, fee-based storage at its facilities:

Electronic Media and Hardware Destruction

There are specific ways to effectively destroy CD/DVDs, hard drives, flash drives, etc. The JHSPH Information Technology office can assist in proper disposal of media and hardware through recycling at no cost to faculty members.

https://www.jhsph.edu/sustainability/electronic-hardware-recycling-faqs

Digital Data Destruction

You can use a variety of safe “erase” methods for data files on your personal computer or laptop. If you have software for encrypting files and file folders, (e.g., VeraCrypt), you can encrypt those files and then delete them rendering the files useless even if recovered.

Other suggestions include:

PCs: www.pcworld.com/article/2464163 www.pcworld.com/article/209418

Macs: