MANAGING AND SHARING DATA. a best practice guide for researchers. Second Edition

Size: px
Start display at page:

Download "MANAGING AND SHARING DATA. a best practice guide for researchers. Second Edition"

Transcription

1 MANAGING AND SHARING DATA a best practice guide for researchers Second Edition

2 The scientific process is enhanced by managing and sharing research data. Good data management practice allows reliable verification of results and permits new and innovative research built on existing information. This is important if the full value of public investment in research is to be realised. JISC considers it a priority to promote and support good data management and sharing for the benefit of UK Higher Education and Research. Through the Managing Research Data Programme, JISC is targeting a number of key areas: helping higher education institutions plan their data management practice; piloting the development of essential data management infrastructure; and promoting the acquisition of appropriate skills, among academics and research support staff in Universities. JISC also funds the Digital Curation Centre, which provides internationally recognised expertise in this area, as well as support and guidance for UK HE. JISC recognises the UK Data Archive as a key partner and stakeholder in these strategic objectives. Managing and Sharing Data: a best practice guide for researchers, is a timely and important publication, and one which JISC wholeheartedly endorses. Simon Hodson, JISC September University of Essex First published 2009 Second edition with minor revisions 2009 Authors: Veerle Van den Eynden, Louise Corti, Matthew Woollard and Libby Bishop. All references available 18 September All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without written permission from the publisher. Published by: UK Data Archive University of Essex Wivenhoe Park Colchester Essex CO4 3SQ ISBN: X Printed by University of Essex Printing Services Endorsed by: Research Laboratory

3 CONTENTS FOREWORD 2 DATA LIFECYCLE 3 SHARING DATA WHY AND HOW 4 Why share research data? 4 How to share data 6 DATA DOCUMENTATION AND METADATA 6 Data documentation 6 Metadata 7 DATA FORMATS AND SOFTWARE 8 Choice of formats and conversions 8 Transcription 10 Data quality control 10 Version control 11 Authenticity 12 Adding value 12 DATA STORAGE, BACK-UP AND SECURITY 13 Making back-ups 13 Data storage 13 Data security 14 Encrypting data for transmission 15 ETHICS, CONSENT AND CONFIDENTIALITY 16 Personal, confidential and sensitive data 16 Informed consent and data sharing 18 Written or verbal consent? 18 One-off or process consent? 19 Anonymising data 20 Access control 21 Open access 21 COPYRIGHT 23

4 FOREWORD Good data management is the foundation for good research. If data are properly organised, preserved and well documented, and their accuracy, validity and integrity is controlled at all times, the result is high quality data, efficient research, outputs based on solid evidence and the saving of time and resources. Researchers benefit greatly from properly managing their research data. Data management should be planned from the start of research. If it becomes part of standard research practice, then it need not necessarily incur much additional time or costs. When it comes to sharing research data, good management is essential to ensure that data can be preserved and remain accessible in the long-term, so they can be re-used and understood by other researchers. When managed and preserved properly, research data can be successfully used for future scientific and educational purposes, thus maximising the investment made in generating the data and increasing the visibility of the research. Data management primarily occurs within the lifecycle of a research project and is ideally carried out by all members of the research team. Digital preservation, which enables long-term data sharing, is often carried out by a specialised data archive or centre. The value of the data to be preserved depends on the quality and efficiency of the data management during research. The data management information provided in this booklet is designed to help researchers and data managers across a wide range of research disciplines and research environments make sure that research data are of the highest quality and have the greatest potential for long-term use. The UK Data Archive thanks data management experts from the National Environmental Research Council (NERC), the NERC Environmental Bioinformatics Centre (NEBC), the Environmental Information Data Centre (EIDC) of the Centre for Ecology and Hydrology (CEH), the British Library (BL), the Research Information Network (RIN), the Archaeology Data Service (ADS), the History Data Service (HDS), the Economic and Social Data Service (ESDS), the London School of Economics Research Laboratory, the Wellcome Trust and the Commission for Rural Communities for reviewing the guidance and providing valuable comments and case studies. Expertise and support for producing this guidance has been provided by the Data Support Service of the interdisciplinary Rural Economy and Land Use (RELU) programme, funded by the Economic and Social Research Council (ESRC), Natural Environment Research Council (NERC) and Biotechnology and Biological Sciences Research Council (BBSRC); as well as by the long-term expertise of the UK Data Archive. This second edition has been co-funded by the Joint Information Systems Committee (JISC). This printed guide is complemented by detailed and practical online information, available from the UK Data Archive web site. The UK Data Archive also provides training and workshops on data management and sharing, including bespoke advice via datasharing@essex.ac.uk or +44 (0) It is recognised that different types of data created and managed across the research discipline spectrum may require certain discipline-specific approaches to data managing and sharing; and that data centres may differ in their approach to specific data management and preservation issues. This guidance has been written for researchers spanning the natural and social sciences and humanities. 2

5 DATA LIFECYCLE Data creation research design data management planning data collection (surveying, experimentation, measuring etc.) data entry or digitisation data checking and cleaning Data analysis analysis derived data creation creation of data documentation End of research research outputs preparing data for preservation Preservation of data storage of data migration to suitable format/medium metadata creation Distribution/publication of data by same researcher by other researchers Re-use of data 3

6 SHARING DATA WHY AND HOW Why share research data? Research data are a valuable resource, usually requiring much time and money to be produced. Many datasets have a significant value beyond the original research. Sharing research data: encourages scientific enquiry and debate enables scrutiny of research outcomes facilitates research beyond the scope of the original research leads to new collaborations between data users and data creators increases the impact and visibility of research reduces the cost of duplicating data collection provides important resources for education and training encourages the improvement and validation of research methods promotes the research that created the data and its outcomes can provide a direct credit to the researcher as a research output in its own right The ease with which digital data can be stored, disseminated and made accessible to secondary users via the internet means that many institutions embrace the sharing of research data to increase the impact and visibility of their research. Research funders increasingly follow guidance from the Organisation for Economic Co-operation and Development (OECD) that publicly funded research data should be openly available to the scientific community to the maximum extent possible. 1 They have adopted data sharing policies and encourage or oblige researchers to share research datasets and outputs. Data sharing policies allow researchers exclusive data use for a reasonable time period in which to publish the results of the data. and NERC data centres. Also the Biotechnology and Biological Sciences Research Council (BBSRC), the Medical Research Council (MRC) and the Wellcome Trust have data policies which encourage researchers to share their research data in a timely manner, with as few restrictions as possible. Journals increasingly require data that form the basis for publications to be shared or deposited within an accessible database or repository. Case study journals data sharing policies Nature journals have a policy that requires authors to make data and materials available to readers, as a condition of publication, preferably via public repositories. 2 Appropriate discipline-specific repositories are suggested. Specifications regarding data standards, compliance or formats may also be provided. For example, for research reporting on small molecule crystal structures, authors should submit such structures to the Cambridge Structural Database (CSD) as a Crystallographic Information File, a standard file structure for the archiving and distribution of crystallographic information. After publication of the manuscript, deposited structures are included in the CSD, from where bona fide researchers can retrieve them for free. CSD has similar deposition agreements with many other journals. Similarly the Publishing Network for Geoscientific and Environmental Data (PANGAEA) is an open access repository for various journals. By giving each deposited dataset a Digital Object Identifier (DOI), a deposited dataset acquires a unique and persistent identifier, and the underlying data can be directly connected to the corresponding article. In the UK, the Economic and Social Research Council (ESRC), the Natural Environment Research Council (NERC) and the British Academy contractually require researchers to offer all research data resulting from their grants to designated data centres UK Data Archive 4 1 Organisation for Economic Co-operation and Development (2007). OECD Principles and Guidelines for Access to Research Data from Public Funding. Available at 2 Nature Publishing Group (2009). Nature journals policy on availability of materials and data. Available at

7 How to share data Research data can be shared: by depositing data with a specialist data centre, data archive or data bank by submitting data to a journal by depositing data in an institutional repository online via a project or institutional web site informally between researchers on a peer-to-peer basis Sharing data by any of these means have their advantages and disadvantages: data centres may not be able to accept all data submitted to them; institutional repositories may not afford adequate provision for the long-term maintenance of, and support for, research data; and web sites may be more ephemeral. Exact approaches to data sharing may vary according to different research environments and disciplines, due to the varying nature of data types and their characteristics. Depositing data with a specialist data centre has additional advantages: helping to ensure that data meet set quality thresholds long-term preservation in standardised accessible data formats, converting formats when needed due to software upgrades or changes regular data back-ups online resource discovery of data through data catalogues licensing arrangements to acknowledge data rights standardised citation mechanism to acknowledge data ownership promotion and dissemination of data to many users monitoring of the secondary usage of data safe-keeping of research data in a secure environment, with ability to control access when needed management of access and user queries on behalf of the data owner Data centres may apply certain criteria to evaluate and select datasets for preservation. Data management plans The Rural Economy and Land Use (RELU) programme, drawing on best practice in data management and sharing across three research councils (ESRC, NERC and BBSRC), requires all funded projects to develop and implement a data management plan to ensure that data are well managed throughout the duration of a research project. 3 In a data management plan researchers describe: the need for access to existing data sources data planned to be produced by the research project planned quality assurance and back-up procedures plans for management and archiving of collected data expected difficulties in making data available for secondary research and measures to overcome such difficulties who holds copyright and intellectual property rights of the data data management and storage roles and responsibilities within the research team As part of its policy on data management and sharing, the Wellcome Trust expects applicants to supply a data management and sharing plan if the goal of the proposal is to create or develop a research resource for the benefit of the research community; or if the proposal involves the generation of a significant quantity of data that could potentially be shared for added benefit. 4 The plan should outline: how the data will be made available to the wider community the proposed timeframe of data sharing data quality and standards the use of public data repositories (which the Trust expects) intellectual property of the data protection of research participants and possible limitations on data sharing long-term preservation and sustainability strategy The Digital Curation Centre is in the process of developing a general data management plan checklist and template for use by researchers to fulfil research funders requirements for data management planning. 5 3 RELU Data Support Service (2005). Project Communication and Data Management Plan. Available at 4 Wellcome Trust (2009). Policy on data management and sharing. Available at 5 Digital Curation Centre (2009). Data Management Plan Content Checklist. Available at 5

8 DATA DOCUMENTATION AND METADATA A crucial part of making data user-friendly, shareable and with long-lasting usability is ensuring that they can be understood, interpreted and used at all times. This requires clear and detailed data description and data documentation. Data documentation Comprehensive data documentation is easiest when begun at the onset of a project and continued throughout the research process. It should be considered as part of best practice in terms of creating, organising and managing data. Data documentation explains how data were created or digitised, what data mean, what their content and structure is, and any manipulations that may have taken place. It ensures that data can be understood during research projects, that researchers continue to understand data in the longer term and that re-users of data are able to interpret the data. Good documentation is also vital for successful data preservation. Good data documentation includes information on: the context of data collection: project history, aims, objectives and hypotheses data collection methods: data collection protocol, sampling design, instruments, hardware and software used, data scale and resolution, temporal coverage and geographic coverage dataset structure of data files, cases, relationships between files data sources used data validation, checking, proofing, cleaning and other quality assurance procedures carried out modifications made to data over time since their original creation and identification of different versions of datasets information on data confidentiality, access and use conditions, where applicable At data-level, datasets should also be documented with: names, labels and descriptions for variables, records and their values explanation of codes and classification schemes used codes of, and reasons for, missing values derived data created after collection, with code, algorithm or command file used to create them weighting and grossing variables created data listing with descriptions for cases, individuals or items studied Variable-level descriptions may be embedded within a dataset itself as metadata. Other documentation may be contained in user guides, reports, publications, working papers and laboratory books. Case study documenting data The Stockholm Environmental Institute has created an integrated spatial dataset, Social and Environmental Conditions in Rural Areas (SECRA), containing socioeconomic and environmental characteristics of all rural Census 2001 Super Output Areas. 6 This dataset is available online as an MS Access database and can be downloaded together with accompanying metadata and documentation files that clearly describe the data. The dataset is organised in four data themes: natural and constructed features; qualities of people and place; living and working; and political and economic context. The dataset is documented in detail by: four data list files providing descriptions of all variables within each data theme four metadata files describing how each variable was constructed and calculated, with references to the data sources used a detailed report describing the rationale for the dataset, the relevance of variables to rural conditions, the methodology used, an overview of variables included per data theme and examples of how the dataset may be used All data files and metadata files are clearly labelled and coded according to the four data themes. 6 6 M.Huby, S.Cinderby and A.Owen (2005). Social and Environmental Conditions in Rural Areas (SECRA). Available at

9 Example of online study-level documentation available for a dataset in the UK Data Archive catalogue Format Name Size in Kilobytes Description PDF guide.pdf 3557 User guide PDF method.pdf 509 Methodology PDF source.pdf 41 Example of sources HTML UKDA Study 4177 Information.htm 18 Study information and citation Metadata In the context of data management, metadata are a subset of core data documentation, which provides standardised structured information explaining the purpose, origin, time references, geographic location, creator, access conditions and terms of use of a dataset. Metadata are typically used: for resource discovery, providing searchable information that helps users to find existing data as a bibliographic record for citation Metadata for online data catalogues or discovery portals are often structured to international standards or schemes such as Dublin Core, ISO for geographic information, Data Documentation Initiative (DDI), Metadata Encoding and Transmission Standard (METS) and General International Standard Archival Description (ISAD(G)). The use of standardised records in extensible Mark-up Language (XML) brings key data documentation together into a single document, creating rich and structured content about the data. Metadata can be viewed with web browsers, can be used for extract and analysis engines and can enable field-specific searching. Disparate catalogues can be shared and interactive browsing tools can be applied. In addition, metadata can be harvested for data sharing through the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). Researchers typically create metadata records for their data by completing a data centre s data deposit form or by using a metadata creation tool, like Go-Geo! GeoDoc or MetaGenie. Providing detailed and meaningful dataset titles, descriptions and keywords, etc., enables data centres to create rich resource-discovery metadata for archived datasets. This should enable more comprehensible resource discovery and data that are easier to use. Data centres accompany each dataset with a bibliographic citation that data users are required to state in research outputs to reference and acknowledge accurately the data source used. A citation gives credit to the data source and distributor and identifies data sources for validation. Case study creating metadata Go-Geo! GeoDoc is an online metadata creation tool that researchers can use to create metadata records for spatial datasets. 7 The metadata records are compliant with the UK GEMINI standard and the ISO geospatial metadata standard. 8 Researchers can create and export metadata records or publish them in the Go-Geo! portal, a discovery portal for geospatial data. 7 EDINA (n.d.). Go-Geo! GeoDoc metadata creator tool. Available at geodoc.edina.ac.uk/geodoc/editor/start 8 e-government Unit (2004). UK GEMINI Standard Version A Geo-spatial Metadata Interoperability Initiative. e-government Unit, Cabinet Office, London. Available at 7

10 DATA FORMATS AND SOFTWARE Choice of formats and conversions The format and software in which research data are created and digitised usually depend on how researchers plan to analyse data, the hardware used, the availability of software, or can be determined by discipline-specific standards and customs. When considering the long-term usability of data, attention needs to be given to the most appropriate software and data format to use. All digital information is designed to be interpreted by computer programs to make it understandable and is, by nature, software dependent. All digital data may thus be endangered by the obsolescence of the hardware and software environment on which access to data depends. Despite the backward compatibility of many software packages to import data created in previous software versions and the interoperability between competing popular software programs, the safest option to guarantee long-term data access is to convert data to standard formats that most software are capable of interpreting, and that are suitable for data interchange and transformation. This typically means using open or standard formats such as OpenDocument Format (ODF), ASCII, tab-delimited format or comma-separated values as opposed to proprietary ones. Some proprietary formats, such as MS Rich Text Format and MS Excel, are widely used and likely to be accessible for a reasonable, but not unlimited, time. Thus, whilst researchers use the most suitable data formats and software according to planned analyses, once data analysis is completed and data are prepared to be stored, researchers should consider converting their research data to standard, interchangeable formats, in order to avoid being unable to use the data in the future. Similarly for back-ups of data, standard formats should be considered. When researchers offer data to data archives for preservation, researchers themselves should convert data to a preferred data preservation format, as the person who knows the data is in the best position to ensure data integrity during conversions. Advice should be sought on up-to-date formats from the intended place of deposit. When data are converted from one format to another through export or by using data translation software certain changes may occur to the data. For data held in spreadsheets or databases, some data or internal metadata may be lost during conversions to another format, e.g. missing value definitions, decimal numbers or variable labels, or data may be truncated. For textual data, editing such as highlighting or bold text may be lost. After software conversions, data should therefore be checked for errors or changes that may be caused by the export process. Case study data formats and conversions The Wessex Archaeology Metric Archive Project has brought together metric animal bone data from a range of archaeological sites in England into a single database format. 9 The dataset contains a selection of measurements commonly taken during Wessex Archaeology zooarchaeological analysis of animal bone fragments found during field investigations. The dataset was created by the researchers in MS Excel and MS Access formats and deposited with the Archaeology Data Service (ADS) in the same formats. ADS has preserved the dataset in Oracle and in comma-separated values format (CSV) and disseminates the data via both an Oracle/Cold Fusion live interface and as downloadable CSV files. For long-term digital preservation, data archives hold data in such standard formats. At the same time, data are offered to users by conversion to current common and user-friendly data formats and may be migrated forward when needed. 8 9 J.Grimm (2008). WAMAP: Wessex Archaeology Metric Archive Project. Available at ads.ahds.ac.uk/catalogue/resources.html?abmap_grimm_na_2008

11 Data formats currently recommended by UK Data Archive for long-term preservation of research data Type of data Preferred formats for management back-ups and data preservation Other acceptable formats for data preservation Quantitative tabular data with extensive metadata a dataset with variable labels, code labels, and defined missing values, in addition to the matrix of data SPSS portable format (.por) delimited text and command ( setup ) file (SPSS, Stata, SAS, etc.) containing metadata information structured text or mark-up file containing metadata information, e.g. DDI XML file proprietary formats of statistical packages e.g. SPSS (.sav), Stata (.dta) MS Access (.mdb/.accdb) Quantitative tabular data with minimal metadata a matrix of data with or without column headings or variable names, but no other metadata or labelling comma-separated values (CSV) file (.csv) tab-delimited file (.tab) including delimited text of given character set with SQL data definition statements where appropriate delimited text of given character set only characters not present in the data should be used as delimiters (.txt) widely-used formats, e.g. MS Excel (.xls/.xlsx), MS Access (.mdb/.accdb), dbase (.dbf) and OpenDocument Spreadsheet (.ods) Geospatial data vector and raster data ESRI Shapefile (essential.shp,.shx,.dbf, optional.prj,.sbx,.sbn) geo-referenced TIFF (.tif,.tfw) CAD data (.dwg) tabular GIS attribute data ESRI Geodatabase format (.mdb) MapInfo Interchange Format (.mif) for vector data Keyhole Mark-up Language (KML) (.kml) Adobe Illustrator (.ai), CAD data (.dxf or.svg) binary formats of GIS and CAD packages Qualitative data textual extensible Mark-up Language (XML) text according to an appropriate Document Type Definition (DTD) or schema (.xml) Rich Text Format (.rtf) plain text data, ASCII (.txt) Hypertext Mark-up Language (HTML) (.html) widely-used proprietary formats, e.g. MS Word (.doc/.docx) proprietary/software-specific formats, e.g. NUD*IST, NVivo and ATLAS.ti Digital image data TIFF version 6 uncompressed (.tif) JPEG (.jpeg,.jpg) TIFF (other versions)(.tif,.tiff) Adobe Portable Document Format (PDF/A, PDF) (.pdf) RAW image format (.raw) software-specific formats, e.g. Photoshop files (.psd) Digital audio data Free Lossless Audio Codec (FLAC) (.flac) Waveform Audio Format (WAV) (.wav) MPEG-1 Audio Layer 3 (.mp3) Audio Interchange File Format (AIFF) (.aif) Digital video data JPEG 2000 (.mj2) Documentation and scripts Rich Text Format (.rtf) PDF/A or PDF (.pdf) HTML (.htm) Open Document Text (.odt) plain text (.txt) widely-used proprietary formats, e.g. MS Word (.doc/.docx) or MS Excel (.xls/.xlsx) XML marked-up text (.xml) according to an appropriate DTD or schema, e.g. XHMTL 1.0 Note that other data centres or digital archives may recommend different formats. 8 9

12 Case study preserving and sharing models Various initiatives aim to preserve and share modelling software and code. In ecology, meta-databases such as the Register of Ecological Models provide standardised metadata and documentation for existing ecological and environmental models and, amongst a variety of metadata, specifies the software used to develop the model. 10 The model code is usually accessible by contacting the model creator. The Forest Model Archive developed at the University of Greenwich offers data providers the opportunity to archive models, besides providing structured documentation. 11 In biology, the BioModels Database of the European Bioinformatics Institute (EBI) is a repository for published mathematical models of biological processes and molecular functions. 12 All models are annotated and linked to relevant data resources. Researchers are encouraged to deposit models written in an open source XML-based format, the Systems Biology Markup Language (SBML), and models are curated for long-term preservation. Sample transcript Study Title: Healthy diets across generations Depositor: K. Jones Interviewer: K. Jones Interview number: 12 Interview ID: Chris Smith Date of interview: 3 May 2007 Information about interviewee Date of birth: 6 June 1949 Gender: male Marital status: widowed Occupation: bricklayer Geographic region: North-East England KJ: Just one or two factual details first of all before we go on to your health and that... how old are you? CS: I m 58 in June. KJ: What schools did you go to? Can you remember that far back! CS: Oh... the last school was at Longside... aye, ken Longside? Transcription Where qualitative data are collected as audio or video recordings, such as for interviews or focus groups, ideally they are transcribed as textual files for archiving and sharing. Transcripts should: have a unique identifier have a document header giving brief details of the data collection event, including date, place, interviewer name and interviewee details have a uniform layout throughout the research project make use of speaker tags indicating the question/ answer sequence use pseudonyms to anonymise personal identifying information have line breaks be page numbered Transcription of statistical tables from historical sources into spreadsheets requires the digital data to be as close to the original as possible, with attention to consistency in transcribing and avoiding the use of formatting in data files. Data quality control Quality control of data is an integral part of all research and takes place at various stages, during data collection, data entry or digitisation, and data checking. It is important to assign clear roles and responsibilities for data quality assurance at all stages of research. During data collection, researchers must ensure that the data recorded reflect the actual facts, responses, observations or events, for example: if data are collected with instruments: - calibration of instruments is essential to check the precision, bias and/or scale of measurement - data are validated by checking for equipment as well as digitisation errors 10 Register of Ecological Models (n.d.). Register of Ecological Models. Available at ecobas.org/www-server/index.html 11 K.Rennols, (2001). Forest Model Archive. Available at cms1.gre.ac.uk/conferences/iufro/fma/index.htm N.Le Novère, B.Bornstein, A.Broicher, M.Courtot, M.Donizelli, H.Dharuri, L.Li, H.Sauro, M.Schilstra, B.Shapiro, J.L.Snoep and M.Hucka (2006) BioModels Database: A Free, Centralized Database of Curated, Published, Quantitative Kinetic Models of Biochemical and Cellular Systems. Nucleic Acids Res., 34: D689-D691. Available at

13 - data may be verified by checking the truth of the record with an expert or by taking multiple measurements, observations or samples standardised methods and protocols can be used for capturing observations, alongside recording forms with clear instructions computer-assisted interview software can be used to standardise interviews, verify response consistency, route and customise questions so that only appropriate questions are asked, confirm responses against previous answers where appropriate and detect inadmissible responses The quality of data collection methods used has a significant bearing on data quality. Documenting in detail how data are collected increases their quality. When data are digitised, transcribed, entered in a database or spreadsheet or coded, quality is ensured by adhering to standardised and consistent procedures for data entry with clear instructions. This may include setting up validation rules or input masks in data entry software; using data entry screens; using controlled vocabularies, code lists and choice lists to minimise manual data entry; detailed labelling of variable and record names to avoid confusion; or designing a purpose-built database structure to organise data and data files. During data checking, data are edited, cleaned, verified, cross-checked and validated. Checking typically involves both automated and manual procedures. This may include: double-checking coding of observations or responses and out-of-range values; checking data completeness; verifying random samples of the digital data against the original data; double entry of data; statistical analyses such as frequencies, means, ranges or clustering to detect errors and anomalous values; or peer review. Best practice is to: uniquely identify files, preferably using a systematic naming convention clearly record version and status of a file, e.g. draft, interim, final, internal record what changes are made to a file when a new version is created record relationships between items as, in many cases, the information contained in a single file is supported by information held in other files, e.g. relationship between the code and the data file it is run against, or between the data file and the documentation or metadata that relate to it, or between multiple tables track the location of all files if stored in a variety of locations regularly synchronise files in different locations, e.g. using MS SyncToy software maintain single master files in a suitable format to remove version control problems associated with multiple working versions being developed in parallel Version control can be maintained through: file naming conventions, using number sequences or dates in file names although avoid very long file names or using spaces and special characters in file names including a file history or version control table at the start of each file, in which versions, dates, authors and details of changes to the file are recorded version control facilities within software controlling rights to file editing versioning software, e.g. Subversion (SVN), or file sharing software such as Google Docs or Amazon S3 manual merging of entries or edits by multiple users Version control It is important to ensure that different copies or versions of files, data held in different formats or locations, and information that is cross-referenced between files are all subject to version control. Checks and procedures should be put in place to make sure that if the information in one file is altered, the related information in other files is also updated if necessary. It is important to keep track of which version of a file is the most current, especially where data files are shared between people or held in different locations. 11

14 Authenticity Digital information can be copied, altered or deleted very easily. It is therefore important to be able to demonstrate the authenticity of data and to prevent unauthorised access to data that may potentially lead to unauthorised changes. Best practice to ensure authenticity and control access is to: keep a master file of data assign responsibility for master files where possible to an individual member of the project team restrict write access to master versions to specific members of the project team create a formal procedure for the destruction of master files record all changes to master files maintain old master files in case later ones contain errors archive copies of master files at regular intervals Adding value Researchers can add significant value to their datasets by including additional variables or parameters that widen the possible applications. Including standard parameters or generic derived variables in data files may substantially increase the potential re-use value of a dataset and provide new avenues for research. For example, geo-referencing data may allow other researchers to more easily add value to data and apply the data in geographical information systems. Case study adding value to data The Commission for Rural Communities (CRC) often use existing survey data to undertake rural and urban analysis of national scale data in order to analyse policies related to deprivation. In order to undertake this type of spatial analysis, original postcodes need to be accessed and retrospectively recoded according to the type of rural or urban settlements they fall into. This can be done with the use of products such as the National Statistics Postcode Directory, which contain a classification of rural and urban settlements in England. The task of applying these geographical markers to datasets can often be a long and sometimes unfruitful process sometimes the CRC have to go through this process to just find that the data do not have a representative rural sample frame. If rural and urban settlement markers, such as the Rural/Urban Definition for England and Wales were included in datasets, this would be of great benefit to those undertaking rural and urban analysis DEFRA, ODPM, NAW, ONS and Countryside Agency (2004). Rural and Urban Area Classification Available at

15 DATA STORAGE, BACK-UP AND SECURITY Making back-ups Making back-ups of files is an essential element of data management. Regular back-ups protect against accidental or malicious data loss due to: hardware failure software or media faults virus infection or malicious hacking power failure human errors Backing-up involves making copies of files which can be used to restore originals if there is loss of data. Choosing a precise back-up procedure to adopt depends on local circumstances, the perceived value of the data and the levels of risk considered appropriate for the circumstances. Where data contain personal information, care should be taken to only create the minimal number of copies needed, e.g. a master file and one back-up copy. When deciding upon the best back-up procedure for data files, researchers need to consider: whether to back-up particular data files or back-up the entire system the frequency of back-up needed - whether to back-up after each change to data file or at regular intervals - frequently used and critical data files may be backedup daily using an automated back-up process which institutional back-up policy may be in place data on an institutional network space may be automatically backed-up at regular intervals back-up strategies for all systems where data are held, including portable computers or devices, non-network computers and home-based computers if applicable whether to carry out incremental or differential back-up - incremental back-up consists of first making a copy of all relevant files, then making incremental back-ups of the files which have altered since the last back-up; removable media (CD/DVD) is recommended for this - for differential back-ups a complete back-up is made first, then back-ups are made of files changed or created since the first full back-up and not just since the last partial back-up; using fixed media such as hard drives is recommended for this the choice of media on which to store back-up files - depends on the quantity of files, type of data, and the preferred method of backing-up - examples include recordable CD/DVD, networked hard drive, removable hard drive or magnetic tape location of back-up files online back-up files or offline storage on removable media or transportable hard drives which can be physically removed to another location for safe-keeping organising and clearly labelling all back-up files file formats - back-ups of master copies should ideally be in formats that are suitable for long-term digital preservation, i.e. open as opposed to proprietary formats verifying and validating back-up files regularly - fully restoring them to another location and comparing them with the originals - checking back-up copies for completeness and integrity, for example by checking the MD5 checksum value, file size and date not overwriting old back-ups with new ones Data storage The storage of any digital research data should be based on two principles: digital storage media are inherently unreliable unless they are stored appropriately all file formats and physical storage media will ultimately become obsolete Alongside a back-up strategy, a data storage strategy should be in place. Media currently available for storing data files are optical media (CDs and DVDs) and magnetic media (hard drives and tapes). Best practice is to: store data in formats which meet long-term software readability requirements; in general this means nonproprietary formats or open standard formats (see the data formats table) obtain up-to-date guidance since changes to formats and media may occur rapidly copy or migrate data files to new media between two and five years after they were first created, since optical media and magnetic media are subject to physical degradation 10 13

16 check the data integrity of stored data files at regular intervals ensure that any storage strategy, even for a short-term project, involves at least two different forms of storage, e.g. on hard drive and on CD create digital versions of paper documentation in PDF/A format for long-term preservation and storage organise stored data well, ensuring they are easily located and physically accessible ensure that areas and rooms designated for storage of digital or non-digital data are suitable for the purpose, are structurally sound and free from the risk of flood and fire Note that optical and magnetic media are vulnerable to poor handling and changes in temperature, relative humidity, air quality and lighting conditions. The National Preservation Office has published guidelines on caring for CDs and DVDs. 14 Non-digital printed materials and photographs are equally subject to degradation, for example from sunlight, from acid in paper or from acid in sweat on the skin. Case study data back-up and storage A research team carrying out coral reef research collects field data using handheld Personal Digital Assistants (PDAs). Digital data are transmitted daily to the institution s network drive, where they are held in password protected files. All data files are identified by an individual version number and creation date. Version information (version numbers and notes detailing differences between versions) is stored in a spreadsheet, also on the network drive. The institution s network drive is fully backed-up onto Ultrium LTO2 data tapes. Incremental back-ups are made daily Monday to Thursday; full server back-ups are made over Friday /Saturday/Sunday. Tapes are securely stored in a separate building. Upon completion of the research the datasets are deposited in the institution s digital repository. Data security Data security is the protection of data from unauthorised access, use, change, disclosure and destruction; as well as the prevention of unwanted changes that can affect the integrity of data. Ensuring data security requires paying attention to physical security, network security and security of computer systems and files. Data security may be needed to protect intellectual property rights, commercial interests, or to keep sensitive information safe. Where the safeguarding of personal data is involved, data security is based on national legislation (Data Protection Act 1998) which dictates that personal data should only be accessible to authorised persons. Personal data may also exist in non-digital format, for example as patient records, completed consent forms or interview cover sheets. These should be protected in the same way as digital files. Data which contain personal information should be treated with higher levels of security than data which do not. Data security arrangements need to be proportionate to the nature of the data and the risks involved. Data security can be made easier by separating data content according to security needs. For example, where data relate to human subjects, personal information such as names and addresses can be removed from data files and stored separately. Physical data security requires: appropriate or restricted access to rooms and buildings where data, computers or media are held logging the removal of, and access to, media or hardcopy material in store rooms transporting sensitive data only under certain exceptional circumstances, even for repair purposes, e.g. giving a failed hard drive containing sensitive data to a computer manufacturer may cause a breach of security Network security means: not storing confidential data such as those containing names or addresses on servers or computers connected to an external network, particularly servers that host internet services L.Finch & J.Webster (2008). Caring for CDs and DVDs. NPO Preservation Guidance. Preservation in Practice Series. London, National Preservation Office. Available at

17 Security of computer systems and files may include: locking computer systems with a password and installing a firewall system protecting from viruses and malicious code through regularly updated virus detection software implementing password protection of, and access permissions to, data files, e.g. no access, read only, read and write or administrator-only permission controlling access to restricted materials with encryption and/or password protection imposing confidentiality agreements for data users of confidential data not sending personal or confidential data via or through File Transfer Protocol (FTP), but rather transmit as encrypted data carrying out the destruction of data in a consistent manner when this is needed - paper should be shredded and computer files permanently deleted from all systems - deleting all files and reformatting a hard drive will not prevent the possible recovery of data that have previously been on that hard drive - specialist advice may need to be sought where needed, CD/DVD shredders can be used and hard drives removed from their casings and disposed of securely It is worth remembering that file sharing services such as Google Docs are not necessarily permanent. The risk of security breaches and disclosure of confidential data can also be removed or reduced by: anonymising digital data by removing identifiers or aggregating data (see section on Anonymising data) separating disclosable from non-disclosable data by obscuring, removing or hiding individual fields, records or data files Encrypting data for transmission Data encryption will maintain data security during transmission. After testing a number of software applications for encrypting data to enable secure data transmission from government departments to the UK Data Archive, the UK Data Archive recommends the use of Pretty Good Privacy (PGP), an industry-standard encryption technology. Available supporting encryption software can be open source, e.g. GnuPG, or commercial, e.g. PGP. Encryption requires the creation of a Public and Private Key pair and passphrase. The Private PGP Key and passphrase are used to digitally sign each encrypted file, and thus allow the recipient to validate the sender s identity. The recipient s Public PGP Key is installed by the sender in order to encrypt files so that only the authorised recipient can decrypt them. Case study data back-up, storage and security In February 2008 the British Library (BL) received the recorded output of the Survey of Anglo-Welsh Dialects (SAWD), carried out by University College, Swansea, between 1969 and This survey recorded the English spoken in Wales by interviewing and tape-recording elderly speakers on topics including the farm and farming, the house and housekeeping, nature, animals, social activities and the weather. The collection was deposited in the form of 503 digital audio files, which were accessioned as.wav files in the BL s Digital Library. Digital clones of all files are held at the Archive of Welsh English, alongside the original master recordings on 151 audio cassettes, from which the digital copies were created. The BL s Digital Library is mirrored on four sites at Boston Spa, St Pancras, Aberystwyth and a dark archive which is provided by a third party. Each of these servers has inbuilt integrity checks. The BL makes available access copies for users, in the form of.mp3 audio files, in the British Library Reading Rooms via the Soundserver system. A small set of audio extracts from the SAWD recordings are also available online on the BL s Accents and Dialects web site, Sounds Familiar. 15

18 ETHICS, CONSENT AND CONFIDENTIALITY When research involves obtaining data from people, e.g. in social, anthropological or medical research, researchers are expected to maintain high ethical standards. Ethical guidelines are typically issued by professional bodies, institutions and funding organisations. Research will usually require obtaining informed consent for people to participate in research and for use of the information collected. It is essential that consent also takes into account long-term use of data, such as preserving and sharing data. Without consent for data sharing, opportunities for sharing research data with other researchers can be jeopardised. Personal, confidential and sensitive data At times data obtained from people may hold sensitive or confidential information. This does not mean that all data obtained by research with participants are confidential. Personal data are defined in the Data Protection Act 1998 as data which relate to a living individual who can be identified from those data, or from those data and other information which is in the possession of, or is likely to come into the possession of, the data controller (e.g. researcher). This includes any expression of opinion about the individual. Confidential data are data that: can be connected to the person providing them or that could lead to the identification of a person referred to (names, addresses, occupation, photographs) are given in confidence, or data agreed to be kept confidential (secret) between two parties, that are not in the public domain are conditioned by factors such as ethical guidelines, legal requirements or research-specific consent agreements Strategies for dealing with confidentiality depend upon the nature of the research, but are essentially informed by a researcher s ethical obligations towards participants and society and by legislation such as the Data Protection Act Legislation that may impact on the sharing of confidential data: 15 duty of confidentiality Data Protection Act 1998 Freedom of Information Act 2000 Human Rights Act 1998 Statistics and Registration Services Act 2007 Environmental Information Regulations 2004 Sensitive and confidential data can be shared ethically if researchers pay attention, from the planning stages of research, to three important aspects: when gaining informed consent, include consent for data sharing where needed, protect people s identities by anonymising data consider access restrictions to data These measures should be considered jointly and never in isolation. The same measures form part of good research practice and data management, even if data sharing is not envisioned. Sensitive personal data are defined in the Data Protection Act 1998 as data that may incriminate a participant or third party, such as a person s race, ethnic origin, political opinion, religious beliefs, trade union membership, physical or mental health, sexual orientation, criminal proceedings or convictions UK Data Archive (2009). Research ethics and legislation relevant to data sharing. Available at

TROPICAL DATA HUB. Best Practice Guidelines for Research Data Management at JCU

TROPICAL DATA HUB. Best Practice Guidelines for Research Data Management at JCU TROPICAL DATA HUB Best Practice Guidelines for Research Data Management at JCU The exponential growth in digital data requires new mechanisms and services to manage data effectively. The benefit of effective

More information

MANAGING QUALITATIVE DATA

MANAGING QUALITATIVE DATA MANAGING QUALITATIVE DATA...... LOUISE CORTI. ASSOCIATE DIRECTOR UNIVERSITY OF ESSEX DATUM WORSHOP, NEWCASTLE 26 May 2011 PRACTICAL ADVICE FOR QUALI RESEARCHERS too much DM advice out there is generic

More information

ARCHIVING YOUR DATA: PLANNING AND MANAGING THE PROCESS

ARCHIVING YOUR DATA: PLANNING AND MANAGING THE PROCESS ARCHIVING YOUR DATA: PLANNING AND MANAGING THE PROCESS LIBBY BISHOP. RESEARCHER LIAISON UNIVERSITY OF ESSEX TCRU/NOVELLA SPECIAL SEMINAR - LONDON 29 MAY 2012 THE & ESDS QUALIDATA forty years experience

More information

SHARING RESEARCH DATA POLICY, INFRASTRUCTURE, PEOPLE

SHARING RESEARCH DATA POLICY, INFRASTRUCTURE, PEOPLE SHARING RESEARCH DATA POLICY, INFRASTRUCTURE, PEOPLE... VEERLE VAN DEN EYNDEN... MANAGER RESEARCH DATA MANAGEMENT SUPPORT SERVICES UNIVERSITY OF ESSEX, UK... CHPC NATIONAL MEETING 2010 7 DECEMBER 2010

More information

www.nerc-bess.net NERC Biodiversity and Ecosystem Service Sustainability (BESS) Data Management Strategy 2011-2016

www.nerc-bess.net NERC Biodiversity and Ecosystem Service Sustainability (BESS) Data Management Strategy 2011-2016 1. Introduction www.nerc-bess.net NERC Biodiversity and Ecosystem Service Sustainability (BESS) Data Management Strategy 2011-2016 This document aims to provide guidance to all research projects operating

More information

DATA LIFE CYCLE & DATA MANAGEMENT PLANNING

DATA LIFE CYCLE & DATA MANAGEMENT PLANNING DATA LIFE CYCLE & DATA MANAGEMENT PLANNING......... VEERLE VAN DEN EYNDEN RESEARCH DATA MANAGEMENT TEAM UNIVERSITY OF ESSEX.. LOOKING AFTER AND MANAGING YOUR RESEARCH DATA (GOING DIGITAL AND ESRC ATN EVENTS),

More information

MANAGING AND SHARING DATA

MANAGING AND SHARING DATA MANAGING AND SHARING DATA BEST PRACTICE FOR RESEARCHERS MAY 2011 First published 2009 Third edition, fully revised, 2011 Authors: Veerle Van den Eynden, Louise Corti, Matthew Woollard, Libby Bishop and

More information

DATA MANAGEMENT FOR QUALITATIVE DATA USING NVIVO9

DATA MANAGEMENT FOR QUALITATIVE DATA USING NVIVO9 DATA MANAGEMENT FOR QUALITATIVE DATA USING NVIVO9 Contents 1. Preparation before importing data into NVivo... 2 1.1. Transcription and digitisation... 2 1.2. Anonymisation of textual data... 2 1.3. File

More information

Checklist for a Data Management Plan draft

Checklist for a Data Management Plan draft Checklist for a Data Management Plan draft The Consortium Partners involved in data creation and analysis are kindly asked to fill out the form in order to provide information for each datasets that will

More information

UK Data Archive Preservation Policy

UK Data Archive Preservation Policy Version 2.0 UK Data Archive Preservation Policy September 2005 UK Data Archive University of Essex Wivenhoe Park Colchester, Essex CO4 3SQ UK Email: archive@essex.ac.uk Tel: +44 (0) 1206 872001 Fax: +44

More information

A grant number provides unique identification for the grant.

A grant number provides unique identification for the grant. Data Management Plan template Name of student/researcher(s) Name of group/project Description of your research Briefly summarise the type of your research to help others understand the purposes for which

More information

Project Plan DATA MANAGEMENT PLANNING FOR ESRC RESEARCH DATA-RICH INVESTMENTS

Project Plan DATA MANAGEMENT PLANNING FOR ESRC RESEARCH DATA-RICH INVESTMENTS Date: 2010-01-28 Project Plan DATA MANAGEMENT PLANNING FOR ESRC RESEARCH DATA-RICH INVESTMENTS Overview of Project 1. Background Research data is essential for good quality research, especially when data

More information

Best Practice in Archiving Qualitative Data. No 65 January 2011. NIRSA Working Paper Series

Best Practice in Archiving Qualitative Data. No 65 January 2011. NIRSA Working Paper Series NIRSA Working Paper Series No 65 January 2011 Best Practice in Archiving Qualitative Data Jane Gray, Julius Komolafe, Hazel O Byrne, Aileen O Carroll (Irish Qualitative Data Archive), Tara Murphy (Tallaght

More information

Guidance. Data Management. Rural Economy and Land Use Programme Data Support Service

Guidance. Data Management. Rural Economy and Land Use Programme Data Support Service Guidance on Data Management Rural Economy and Land Use Programme Data Support Service Guidance on Data Management Introduction This document provides data management guidance to Rural Economy and Land

More information

LJMU Research Data Policy: information and guidance

LJMU Research Data Policy: information and guidance LJMU Research Data Policy: information and guidance Prof. Director of Research April 2013 Aims This document outlines the University policy and provides advice on the treatment, storage and sharing of

More information

Storing and securing your data

Storing and securing your data Storing and securing your data Research Data Management Support Services UK Data Service University of Essex April 2014 Overview Looking after research data for the longer-term and protecting them from

More information

Checklist and guidance for a Data Management Plan

Checklist and guidance for a Data Management Plan Checklist and guidance for a Data Management Plan Please cite as: DMPTuuli-project. (2016). Checklist and guidance for a Data Management Plan. v.1.0. Available online: https://wiki.helsinki.fi/x/dzeacw

More information

Timescapes Methods Guides Series 2012 Guide No. 17

Timescapes Methods Guides Series 2012 Guide No. 17 Introduction... The archiving, sharing and re-use of research data is a growing part of research culture in the UK, and is central to the Timescapes Initiative. Advances made in these fields under Timescapes

More information

Research Data Management: The library s role

Research Data Management: The library s role CILIP Executive Briefings 2014 Research Data Management: The library s role Tuesday 20 May 2014 Organised by #CILIPRDM @CILIPEvents Engaging with students and researchers: the case of the social sciences

More information

An Introduction to Managing Research Data

An Introduction to Managing Research Data An Introduction to Managing Research Data Author University of Bristol Research Data Service Date 1 August 2013 Version 3 Notes URI IPR data.bris.ac.uk Copyright 2013 University of Bristol Within the Research

More information

Storing and securing your data

Storing and securing your data Storing and securing your data Veerle Van den Eynden UK Data Service Advanced training course Managing and sharing your research data 18-19 June 2015 Overview Looking after research data for the longer-term

More information

Life Cycle of Records

Life Cycle of Records Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible

More information

Storage, backup, transfer, encryption of data

Storage, backup, transfer, encryption of data Storage, backup, transfer, encryption of data Veerle Van den Eynden UK Data Archive Looking after your research data: practical data management for research projects 5 May 2015 Overview Looking after research

More information

DATA MANAGEMENT PLANNING

DATA MANAGEMENT PLANNING DATA MANAGEMENT PLANNING VEERLE VAN DEN EYNDEN & BETHANY MORGAN BRETT... UNIVERSITY OF ESSEX... Data management and documentation - social sciences CHPC National Meeting 2010, Cape Town 8-9 December 2010

More information

TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL

TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL INTRODUCTION WHAT IS A RECORD? AS ISO 15489-2002 Records Management defines a record as information created,

More information

Managing and Sharing research Data

Managing and Sharing research Data Managing and Sharing research A Guide to Good Practice Louise Corti Veerle Van den Eynden Libby Bishop & Matthew Woollard Corti_ AW.indd 8 13/02/2014 14:00 00_Corti_et_al_Prelims.indd 3 2/25/2014 6:02:00

More information

Research Data Management Procedures

Research Data Management Procedures Research Data Management Procedures pro-123 To be read in conjunction with: Research Data Management Policy Version: 2.00 Last amendment: Oct 2014 Next Review: Oct 2016 Approved By: Academic Board Date:

More information

Guidelines on Information Deliverables for Research Projects in Grand Canyon National Park

Guidelines on Information Deliverables for Research Projects in Grand Canyon National Park INTRODUCTION Science is playing an increasing role in guiding National Park Service (NPS) management activities. The NPS is charged with protecting and maintaining data and associated information that

More information

AHDS Digital Preservation Glossary

AHDS Digital Preservation Glossary AHDS Digital Preservation Glossary Final version prepared by Raivo Ruusalepp Estonian Business Archives, Ltd. January 2003 Table of Contents 1. INTRODUCTION...1 2. PROVENANCE AND FORMAT...1 3. SCOPE AND

More information

Data storage, collaboration, backup, transfer and encryption

Data storage, collaboration, backup, transfer and encryption Data storage, collaboration, backup, transfer and encryption Scott Summers UK Data Archive Practical research data management 19 April 2016 Overview Looking after research data for the longer-term and

More information

Research Data Archival Guidelines

Research Data Archival Guidelines Research Data Archival Guidelines LEROY MWANZIA RESEARCH METHODS GROUP APRIL 2012 Table of Contents Table of Contents... i 1 World Agroforestry Centre s Mission and Research Data... 1 2 Definitions:...

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

The data landscape lessons from UK

The data landscape lessons from UK The data landscape lessons from UK Veerle Van den Eynden UK Data Archive University of Essex Faculty of Psychology and Educational Sciences University of Ghent, Belgium 23 October 2014 UK data landscape

More information

Data documentation and metadata for data archiving and sharing. Data Management and Sharing workshop Vienna, 14 15 April 2010

Data documentation and metadata for data archiving and sharing. Data Management and Sharing workshop Vienna, 14 15 April 2010 Data documentation and metadata for data archiving and sharing Data Management and Sharing workshop Vienna, 14 15 April 2010 Why document data? enables you to understand/interpret data needed to make data

More information

ANU Electronic Records Management System (ERMS) Manual

ANU Electronic Records Management System (ERMS) Manual ANU Electronic Records Management System (ERMS) Manual May 2015 ERMS Manual May 2015 1 Contents The ERMS Manual 1. Introduction... 3 2. Policy Principles... 3 3. The Electronic Records Management System...

More information

Documenting the research life cycle: one data model, many products

Documenting the research life cycle: one data model, many products Documenting the research life cycle: one data model, many products Mary Vardigan, 1 Peter Granda, 2 Sue Ellen Hansen, 3 Sanda Ionescu 4 and Felicia LeClere 5 Introduction Technical documentation for social

More information

Research Data Management PROJECT LIFECYCLE

Research Data Management PROJECT LIFECYCLE PROJECT LIFECYCLE Introduction and context Basic Project Info. Thesis Title UH or Research Council? Duration Related Policies UH and STFC policies: open after publication as your research is public funded

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Digital preservation policy

Digital preservation policy Digital preservation policy City of London Culture, Heritage and Libraries Department London Metropolitan Archives Contents Digital preservation policy... 1 Contents... 2 Vision statement... 3 Policy...

More information

Management of Official Records in a Business System

Management of Official Records in a Business System GPO Box 2343 ADELAIDE SA 5001 Tel (08) 8204 8773 Fax (08) 8204 8777 DX:467 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Management of Official Records in a Business System October 2011 Version

More information

ETHICAL AND LEGAL ISSUES IN DATA SHARING - OVERVIEW

ETHICAL AND LEGAL ISSUES IN DATA SHARING - OVERVIEW ETHICAL AND LEGAL ISSUES IN DATA SHARING - OVERVIEW.... LIBBY BISHOP UNIVERSITY OF ESSEX.... LOOKING AFTER AND MANAGING YOUR RESEARCH DATA (GOING DIGITAL AND ESRC ATN EVENTS), COLCHESTER, 24-25 APRIL 2013

More information

Data access and management

Data access and management B Data access and management CONTENTS B.1 Introduction... B-1 B.2 Data requirements and availability... B-1 B.3 Data access... B-2 B.4 Overall procedures... B-2 B.5 Data tools and management... B-4 Appendix

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

Introduction to Research Data Management. Tom Melvin, Anita Schwartz, and Jessica Cote April 13, 2016

Introduction to Research Data Management. Tom Melvin, Anita Schwartz, and Jessica Cote April 13, 2016 Introduction to Research Data Management Tom Melvin, Anita Schwartz, and Jessica Cote April 13, 2016 What Will We Cover? Why is managing data important? Organizing and storing research data Sharing and

More information

STORRE: Stirling Online Research Repository Policy for etheses

STORRE: Stirling Online Research Repository Policy for etheses STORRE: Stirling Online Research Repository Policy for etheses Contents Content and Collection Policies Definition of Repository Structure Content Guidelines Submission Process Copyright and Licenses Metadata

More information

Guide to good practice: micro data handling and security

Guide to good practice: micro data handling and security The work is licensed under the Creative Commons Attribution-Non-Commercial-Share Alike 2.0 UK: England and Wales Licence. To view a copy of this licence, visit creativecommons.org/licenses/by-nc-sa/2.0/uk/

More information

Research Data Management Policy

Research Data Management Policy Research Data Management Policy Version Number: 1.0 Effective from 06 January 2016 Author: Research Data Manager The Library Document Control Information Status and reason for development New as no previous

More information

Embedding Digital Continuity in Information Management

Embedding Digital Continuity in Information Management Embedding Digital Continuity in Information Management This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital

More information

National Statistics Code of Practice Protocol on Data Management, Documentation and Preservation

National Statistics Code of Practice Protocol on Data Management, Documentation and Preservation National Statistics Code of Practice Protocol on Data Management, Documentation and Preservation National Statistics Code of Practice Protocol on Data Management, Documentation and Preservation London:

More information

Electronic Records Management Guidelines - File Formats

Electronic Records Management Guidelines - File Formats Electronic Records Management Guidelines - File Formats Rapid changes in technology mean that file formats can become obsolete quickly and cause problems for your records management strategy. A long-term

More information

Archive I. Metadata. 26. May 2015

Archive I. Metadata. 26. May 2015 Archive I Metadata 26. May 2015 2 Norstore Data Management Plan To successfully execute your research project you want to ensure the following three criteria are met over its entire lifecycle: You are

More information

Research Data Management Policy

Research Data Management Policy Research Data Management Policy University of Wales Trinity Saint David Group Research Data Management Policy Contents 1. Introduction... 2 2. Purpose... 2 3. Scope... 3 4. Policy... 3 5. Monitoring...

More information

The legal admissibility of information stored on electronic document management systems

The legal admissibility of information stored on electronic document management systems Softology Ltd. The legal admissibility of information stored on electronic document management systems July 2014 SOFTOLOGY LIMITED www.softology.co.uk Specialist Expertise in Document Management and Workflow

More information

Benefits of managing and sharing your data

Benefits of managing and sharing your data Benefits of managing and sharing your data Research Data Management Support Services UK Data Service University of Essex April 2014 Overview Introduction to the UK Data Archive What is data management?

More information

National Data Sharing and Accessibility Policy (NDSAP)

National Data Sharing and Accessibility Policy (NDSAP) Draft National Data Sharing and Accessibility Policy (NDSAP) 1. Introduction 1.1 Data are recognized at all levels as a valuable resource that should be made publicly available and maintained over time

More information

File Formats. Summary

File Formats. Summary Summary Rapid changes in technology mean that file formats can become obsolete quickly and cause problems for your records management strategy. A long-term view and careful planning can overcome this risk

More information

Mapping the Technical Dependencies of Information Assets

Mapping the Technical Dependencies of Information Assets Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital

More information

Earth Science Academic Archive

Earth Science Academic Archive Earth Science Academic Archive The Principles of Good Data Management The National Geoscience Data Centre British Geological Survey, Keyworth, Nottingham, NG12 5GG Contents Purpose of this guide 1 What

More information

Local Government Cyber Security:

Local Government Cyber Security: Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and

More information

Data Management Planning

Data Management Planning DIY Research Data Management Training Kit for Librarians Data Management Planning Kerry Miller Digital Curation Centre University of Edinburgh Kerry.miller@ed.ac.uk Running Order I. What is Research Data

More information

Irish Qualitative Data Archive

Irish Qualitative Data Archive Irish Qualitative Data Archive Dr. Jane Gray Irish Qualitative Data Archive, National Institute for Regional and Spatial Analysis NUI Maynooth Children s Research Network Masterclass, January 26th, 2012

More information

Digital Continuity Plan

Digital Continuity Plan Digital Continuity Plan Ensuring that your business information remains accessible and usable for as long as it is needed Accessible and usable information Digital continuity Digital continuity is an approach

More information

LIBER Case Study: University of Oxford Research Data Management Infrastructure

LIBER Case Study: University of Oxford Research Data Management Infrastructure LIBER Case Study: University of Oxford Research Data Management Infrastructure AuthorS: Dr James A. J. Wilson, University of Oxford, james.wilson@it.ox.ac.uk Keywords: generic, institutional, software

More information

6. FINDINGS AND SUGGESTIONS

6. FINDINGS AND SUGGESTIONS 6. FINDINGS AND SUGGESTIONS 6.1 Introduction: The advancements in ICT and their proper utilization by research and academic librarians are not only strengthening the capabilities of libraries but also

More information

TEXT FILES. Format Description / Properties Usage and Archival Recommendations

TEXT FILES. Format Description / Properties Usage and Archival Recommendations TEXT FILES Format Description / Properties Usage and Archival Recommendations.txt.doc.docx.rtf.odt.pdf PDF/A Text file Simple plain text document Compatible across software packages Supports very little

More information

Current Page Location. Tips for Authors and Creators of Digital Content: Using your Institution's Repository: Using Version Control Software:

Current Page Location. Tips for Authors and Creators of Digital Content: Using your Institution's Repository: Using Version Control Software: Home > Framework > Content Creation Advice Tips for Authors and Creators of Digital Content: Keep a record of which versions you have made publicly available and where. Use a numbering system that denotes

More information

Geospatial Data Stewardship at an Interdisciplinary Data Center

Geospatial Data Stewardship at an Interdisciplinary Data Center Geospatial Data Stewardship at an Interdisciplinary Data Center Robert R. Downs, PhD Senior Digital Archivist and Senior Staff Associate Officer or Research Acting Head of Cyberinfrastructure and Informatics

More information

Preservation Handbook

Preservation Handbook Preservation Handbook [Binary Text / Word Processor Documents] Author Rowan Wilson and Martin Wynne Version Draft V3 Date 22 / 08 / 05 Change History Revised by MW 22.8.05; 2.12.05; 7.3.06 Page 1 of 7

More information

NERC Data Policy Guidance Notes

NERC Data Policy Guidance Notes NERC Data Policy Guidance Notes Author: Mark Thorley NERC Data Management Coordinator Contents 1. Data covered by the NERC Data Policy 2. Definition of terms a. Environmental data b. Information products

More information

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:

More information

Standards Development. PROS 14/00x Specification 3: Long term preservation formats

Standards Development. PROS 14/00x Specification 3: Long term preservation formats Standards Development PROS 14/00x Specification 3: Long term preservation formats 1 2 Copyright Statement State of Victoria 2014 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 This work is licensed

More information

Data management plan

Data management plan FACILITATE OPEN SCIENCE TRAINING FOR EUROPEAN RESEARCH 612425 Data management plan Course for Doctoral Students at ECPR Summer School 2015 Faculty of Social Sciences, University of Ljubljana, Slovenia

More information

OpenAIRE Research Data Management Briefing paper

OpenAIRE Research Data Management Briefing paper OpenAIRE Research Data Management Briefing paper Understanding Research Data Management February 2016 H2020-EINFRA-2014-1 Topic: e-infrastructure for Open Access Research & Innovation action Grant Agreement

More information

State Records Office Guideline. Management of Digital Records

State Records Office Guideline. Management of Digital Records State Records Office Guideline Management of Digital Records An Information Management Guideline for State Organizations Version 2 January 2015 www.sro.wa.gov.au Contents GLOSSARY... 2 PURPOSE... 5 BACKGROUND...

More information

NSW Data & Information Custodianship Policy. June 2013 v1.0

NSW Data & Information Custodianship Policy. June 2013 v1.0 NSW Data & Information Custodianship Policy June 2013 v1.0 CONTENTS 1. PURPOSE... 4 2. INTRODUCTION... 4 2.1 Information Management Framework... 4 2.2 Data and information custodianship... 4 2.3 Terms...

More information

Creating a Data Management Plan for your Research

Creating a Data Management Plan for your Research Creating a Data Management Plan for your Research EPFL Workshop Lausaunne, 28 Oct 2014 Robin Rice, Laine Ruus EDINA and Data Library Course content What is a Data Management Plan? Benefits and drivers

More information

CCG: IG06: Records Management Policy and Strategy

CCG: IG06: Records Management Policy and Strategy Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of

More information

Edinburgh University Data Library Research Data Management Handbook. v.1.0 (Aug. 2011)

Edinburgh University Data Library Research Data Management Handbook. v.1.0 (Aug. 2011) Edinburgh University Data Library Research Data Management Handbook v.1.0 (Aug. 2011) Table of Contents Section 1. page 3 Why manage research data page 4 Defining research data page 5 Funders policies

More information

Records Management - Department of Health

Records Management - Department of Health Policy Directive Records Management - Department of Health Document Number PD2009_057 Publication date 24-Sep-2009 Functional Sub group Corporate Administration - Records Ministry of Health, NSW 73 Miller

More information

STATE OF NEBRASKA STATE RECORDS ADMINISTRATOR DURABLE MEDIUM WRITTEN BEST PRACTICES & PROCEDURES (ELECTRONIC RECORDS GUIDELINES) OCTOBER 2009

STATE OF NEBRASKA STATE RECORDS ADMINISTRATOR DURABLE MEDIUM WRITTEN BEST PRACTICES & PROCEDURES (ELECTRONIC RECORDS GUIDELINES) OCTOBER 2009 STATE OF NEBRASKA STATE RECORDS ADMINISTRATOR DURABLE MEDIUM WRITTEN BEST PRACTICES & PROCEDURES (ELECTRONIC RECORDS GUIDELINES) OCTOBER 2009 Following is a voluntary guideline issued by the State Records

More information

Data Management Implementation Plan

Data Management Implementation Plan Appendix 8.H Data Management Implementation Plan Prepared by Vikram Vyas CRESP-Amchitka Data Management Component 1. INTRODUCTION... 2 1.1. OBJECTIVES AND SCOPE... 2 2. DATA REPORTING CONVENTIONS... 2

More information

RESEARCH DATA MANAGEMENT POLICY

RESEARCH DATA MANAGEMENT POLICY Document Title Version 1.1 Document Review Date March 2016 Document Owner Revision Timetable / Process RESEARCH DATA MANAGEMENT POLICY RESEARCH DATA MANAGEMENT POLICY Director of the Research Office Regular

More information

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW

More information

Introduction The Co-Motion Data Management Plan draws upon guidance from the Centre for Housing Policy s Data

Introduction The Co-Motion Data Management Plan draws upon guidance from the Centre for Housing Policy s Data Co-Motion: Data Management Plan Design for Wellbeing: Ageing and Mobility in the Built Environment EPSRC Grant Reference: EP/K03748X/1 Principal Investigator: Dr Mark Bevan Contact Project Manager: co-motion@york.ac.uk

More information

Implementing selection and appraisal policies at the UK Data Archive

Implementing selection and appraisal policies at the UK Data Archive Implementing selection and appraisal policies at the UK Data Archive K. Schürer UK Data Archive and Economic and Social Data Service DCC and DPC Workshop, Oxford 4 th July 2006 UKDA history & overview

More information

POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS

POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS 1. Purpose Establish and clarify a records management policy for municipal officers with respect

More information

ESRC Research Data Policy

ESRC Research Data Policy ESRC Research Data Policy Introduction... 2 Definitions... 2 ESRC Research Data Policy Principles... 3 Principle 1... 3 Principle 2... 3 Principle 3... 3 Principle 4... 3 Principle 5... 3 Principle 6...

More information

Data Management Plan. Name of Contractor. Name of project. Project Duration Start date : End: DMP Version. Date Amended, if any

Data Management Plan. Name of Contractor. Name of project. Project Duration Start date : End: DMP Version. Date Amended, if any Data Management Plan Name of Contractor Name of project Project Duration Start date : End: DMP Version Date Amended, if any Name of all authors, and ORCID number for each author WYDOT Project Number Any

More information

ANONYMISATION VEERLE VAN DEN EYNDEN & BETHANY MORGAN BRETT... UK DATA ARCHIVE UNIVERSITY OF ESSEX...

ANONYMISATION VEERLE VAN DEN EYNDEN & BETHANY MORGAN BRETT... UK DATA ARCHIVE UNIVERSITY OF ESSEX... ANONYMISATION VEERLE VAN DEN EYNDEN & BETHANY MORGAN BRETT... UNIVERSITY OF ESSEX... Data management and documentation - social sciences CHPC National Meeting 2010, Cape Town 8-9 December 2010 WHY ANONYMISE

More information

Scotland s Commissioner for Children and Young People Records Management Policy

Scotland s Commissioner for Children and Young People Records Management Policy Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives

More information

Writing a Wellcome Trust Data Management & Sharing Plan

Writing a Wellcome Trust Data Management & Sharing Plan Writing a Wellcome Trust Data Management & Sharing Plan Report Version Control Version Date Author Change Description 1.3 02 September 2014 Gareth Knight Revision to Q1, Q2, Q4 and Q6 on basis of feedback

More information

CITY UNIVERSITY OF HONG KONG. Information Classification and

CITY UNIVERSITY OF HONG KONG. Information Classification and CITY UNIVERSITY OF HONG KONG Handling Standard (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Functional Requirements for Digital Asset Management Project version 3.0 11/30/2006

Functional Requirements for Digital Asset Management Project version 3.0 11/30/2006 /30/2006 2 3 4 5 6 7 8 9 0 2 3 4 5 6 7 8 9 20 2 22 23 24 25 26 27 28 29 30 3 32 33 34 35 36 37 38 39 = required; 2 = optional; 3 = not required functional requirements Discovery tools available to end-users:

More information

RECORDS MANAGEMENT POLICY

RECORDS MANAGEMENT POLICY [Type text] RECORDS MANAGEMENT POLICY POLICY TITLE Academic Year: 2013/14 onwards Target Audience: Governing Body All Staff and Students Stakeholders Final approval by: CMT - 1 October 2014 Governing Body

More information

Introduction. 1. Name of your organisation: 2. Country (of your organisation): Page 2

Introduction. 1. Name of your organisation: 2. Country (of your organisation): Page 2 Introduction 1. Name of your organisation: 2. Country (of your organisation): 6 Page 2 Policies and Procedures The following questions address the policies and procedures regarding data management (acquisition,

More information

Research Data Management For Researchers

Research Data Management For Researchers For Researchers Dr Joanna Goodger Information Hertfordshire With Bill Worthington, Sara Hajnassiri, and Mohamed Hansraj AN INTRODUCTION Research Councils The majority of data is funded by the Government

More information

1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer.

1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer. Disclaimer: As a condition to the use of this document and the information contained herein, the SWGIT requests notification by e-mail before or contemporaneously to the introduction of this document,

More information

Queensland recordkeeping metadata standard and guideline

Queensland recordkeeping metadata standard and guideline Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security

More information