About the Research Database Complex (RDC) at Indiana University

On this page:


System overview

The Indiana University Research Database Complex supports research-related MySQL databases and data-intensive applications that require databases. The RDC is strictly devoted to supporting research, and is not an instructional, classroom environment.

For RDC usage policies, including information about your responsibilities for maintaining database security and acknowledging grant support, see IU RDC usage policies.

The RDC supports MySQL Enterprise Server.

User home directories are hosted on Geode. By default, you have a 100 GB disk quota and a maximum file limit of 800,000 files, which are shared with your accounts on IU's research supercomputers.

Owners of RDC MySQL database accounts are responsible for creating backups of their databases.

Before storing data on this system, make sure you understand the information in the Work with data containing PHI section (below).

The RDC maintenance window is the second Sunday of each month, 7am-7pm. Notice of any emergency downtime will be posted at Status.IU.

System access

To request an RDC database account, use the RDC Database Account Application.

Note:
You can request a group RDC database account if your group has an established IU group account username, but you must provide the IU usernames of everyone who will be permitted to use the group database account. The person requesting the group database account will be considered the owner and responsible party for the account, and is expected to communicate system downtimes and other system information to the group.

You will receive a message in email confirming the creation of your database. Your database login credentials and information about connecting to your database will be sent separately. contact RDC Administration to have your database password reset.

You can access and manage your RDC database from your personal workstation and from your own servers. You also can access your RDC database from Carbonate, Karst, and Research Desktop (RED).

To request an account on an Indiana University research system, see Get additional IU computing accounts. Account availability depends on your eligibility.

For instructions on connecting to your RDC database, see Access your MySQL database on the RDC at IU.

Work with data containing PHI

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) established rules protecting the privacy and security of individually identifiable health information. The HIPAA Privacy Rule and Security Rule set national standards requiring organizations and individuals to implement certain administrative, physical, and technical safeguards to maintain the confidentiality, integrity, and availability of protected health information (PHI).

This UITS system or service meets certain requirements established in the HIPAA Security Rule thereby enabling its use for work involving data that contain protected health information (PHI). However, using this system or service does not fulfill your legal responsibilities for protecting the privacy and security of data that contain PHI. You may use this system or service for work involving data that contain PHI only if you institute additional administrative, physical, and technical safeguards that complement those UITS already has in place.

For more, see Your legal responsibilities for protecting data containing protected health information (PHI) when using UITS Research Technologies systems and services.

Note:
Although PHI is classified as Critical data, other types of institutional data classified as Critical are not permitted on Research Technologies systems. For help determining which institutional data elements classified as Critical are considered PHI, see About protected health information (PHI) data elements in the classifications of institutional data.

SecureMyResearch, a joint initiative of Indiana University's Center for Applied Cybersecurity Research (CACR) and UITS Research Technologies, provides self-service resources and one-on-one consulting to help IU researchers, faculty, and staff meet cybersecurity and compliance requirements for processing, storing, and sharing research data, including PHI. If you have questions about securing HIPAA-regulated research data at IU, email securemyresearch@iu.edu. To learn more about properly ensuring the safe handling of PHI on UITS systems, see the UITS IT Training video Securing HIPAA Workflows on UITS Systems. To learn about division of responsibilities for securing PHI, see Shared responsibility model for securing PHI on UITS systems.

Get help

For MySQL documentation, see the MySQL Reference Manual.

Support for IU research supercomputers, software, and services is provided by the Research Technologies division of UITS. To ask a question or get help, contact UITS Research Technologies.

This is document amuw in the Knowledge Base.
Last modified on 2020-03-11 15:12:46.

Contact us

For help or to comment, email the UITS Support Center.