The Research Database Complex (RDC) at Indiana University

On this page:


System overview

The Indiana University Research Database Complex supports research-related MySQL databases and data-intensive applications that require databases. The RDC is strictly devoted to supporting research, and is not an instructional, classroom environment.

For RDC usage policies, including information about your responsibilities for maintaining database security and acknowledging grant support, see IU RDC usage policies.

The RDC supports MySQL Enterprise Server.

User home directories reside on a network-attached storage (NAS) device. You have a 100 GB (default) disk quota, which is shared with your accounts on IU's research computing systems.

Owners of RDC MySQL database accounts are responsible for creating backups of their databases.

Note:
Before storing data on this system, make sure you understand the information in the Working with data containing PHI section (below).

The RDC maintenance window is the second Sunday of each month, 7am-7pm. Notice of any emergency downtime will be posted at Status.IU.

System access

To request an RDC database account, use the RDC Database Account Application.

Note:
You can request a group RDC database account if your group has an established IU group account username, but you must provide the IU usernames of everyone who will be permitted to use the group database account. The person requesting the group database account will be considered the owner and responsible party for the account, and is expected to communicate system downtimes and other system information to the group.

You will receive a message in email confirming the creation of your database. Your database login credentials and information about connecting to your database will be sent separately. contact RDC Administration to have your database password reset.

You can access and manage your RDC database from your personal workstation and from your own servers. You also can access your RDC database from Carbonate, Karst, and Research Desktop (RED).

To request an account on an Indiana University research system, see Get additional IU computing accounts. Account availability depends on your eligibility.

For instructions on connecting to your RDC database, see Access your MySQL database on the RDC at IU.

Work with data containing PHI

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) established rules protecting the privacy and security of individually identifiable health information. The HIPAA Privacy Rule and Security Rule set national standards requiring organizations and individuals to implement certain administrative, physical, and technical safeguards to maintain the confidentiality, integrity, and availability of protected health information (PHI).

This UITS system or service meets certain requirements established in the HIPAA Security Rule thereby enabling its use for work involving data that contain protected health information (PHI). However, using this system or service does not fulfill your legal responsibilities for protecting the privacy and security of data that contain PHI. You may use this system or service for work involving data that contain PHI only if you institute additional administrative, physical, and technical safeguards that complement those UITS already has in place.

Note:
Although PHI is one type of institutional data classified as Critical at IU, other types of institutional data classified as Critical are not permitted on Research Technologies systems. For help determining which institutional data elements classified as Critical are considered PHI, see About protected health information (PHI) data elements in the classifications of institutional data .

For more, see Your legal responsibilities for protecting data containing protected health information (PHI) when using UITS Research Technologies systems and services.

UITS provides consulting and online help for Indiana University researchers, faculty, and staff who need help securely processing, storing, and sharing data containing protected health information (PHI). If you have questions about managing HIPAA-regulated data at IU, contact UITS HIPAA Consulting. To learn more about properly ensuring the safe handling of PHI on UITS systems, see the UITS IT Training video Securing HIPAA Workflows on UITS Systems. For additional details about HIPAA compliance at IU, see HIPAA Privacy & Security on the University Compliance website.

Get help

For MySQL documentation, see the MySQL Reference Manual.

Support for IU research computing systems, software, and services is provided by the Research Technologies division of UITS. To ask a question or get help, contact UITS Research Technologies.

This is document amuw in the Knowledge Base.
Last modified on 2018-11-07 12:26:11.

Contact us

For help or to comment, email the UITS Support Center.