The links below direct you to charts listing the various computer file storage systems of that type available to Lehigh users. Further details regarding the use and features of most systems are linked from their names on the charts. Researchers: Be aware that your funding agency may have requirements regarding the storage and management of research data that you generate.
Click the links below for full details on each storage location type.
- Local Storage:
- Most computers and 'smart devices' offer some built-in facility for storing data internally, or by directly connecting storage media, like hard drives, flash drives, optical disks, or memory cards.
- LAN (Network) Storage:
- Lehigh offers a number of systems on campus that devices can connect to for storing data, and strongly recommends storing university data there. These systems are accessed over the Lehigh network either with an Ethernet cable or Lehigh wireless connection, or from off-campus via the VPN. Most of these systems use redundant hardware, and most are backed up automatically and maintained by dedicated LTS staff. These include the H: and I: drives mapped to Windows PCs, for which a year's worth of backups are stored in a secure, off-site facility. Other systems are available for specific types of files (such as course materials and video files) and for research data as well.
- Internet (Cloud) Storage:
- In addition to Local and LAN storage, Lehigh's network also provides access to contracted vendors that offer additional, internet-based (cloud) storage services such as Google Drive, Microsoft OneDrive, Lehigh DropBox for Business, and Crashplan Desktop Backup with varying costs and capabilities, and which can be used for Lehigh data, depending on the type of information.
Again, be aware that all data storage (computer file storage) at Lehigh is governed by the Data Classification Policy, the Records Retention Policy, and the Cloud Computing Policy. Many systems are not backed up by default and additional configuration and / or provision may be needed to keep information protected. General guidelines on this topic are presented at LTS Seminars, and the slides for this one are available.