Open Access: Data Protection, Storage and Sharing

777 views

Published on

A presentation by Caroline Dominey as part of Open Access Week at the University of Exeter.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
777
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Open Access: Data Protection, Storage and Sharing

  1. 1. Open Access: DataProtection, Storage andSharing Caroline Dominey
  2. 2. Open Access is all about sharing researchfreely and openly -Data Protection Act is all about protectingpeoples rights in respect to how informationabout them is used. -Freedom of Information provides right toaccess official information held by publicauthorities -Confidentiality in maintaining Trade Secrets &commercial interests etc
  3. 3. Data Protection Act• FAIR PROCESSING • Fair • Open and transparent • Justified • Reasonable• SECURITY • Technical and Operational Measures to protect against • Unauthorised Access • Damage to the Data • Loss of Data
  4. 4. 1. Can we ensure fair processing of personal data when it’s deposited in Open Access archives? If so, how?2. How can we ensure the security of personal and confidential data throughout the research process and into Open Access Archives?
  5. 5. Fair Processing• Consent• Information for research participants• Contractual Clauses• Anonymisation (Raw Data vs. Articles)• Ethics• User Licences• Dark Archive
  6. 6. What to tell participants?• Standard information (who you are, what you’re researching etc)• What information are you collecting (photos, personal experiences)?• Who will have access to the data? Can you guarantee that identities will be protected?• Will data be placed in an archive? Who will be able to access this?• What are they consenting to?
  7. 7. Anonymisation• Is it necessary? Oral histories, profiles• Time consuming• Removal of direct identifiers• Removal of indirect identifiers• Devalue research data?• Research publications vs outputs
  8. 8. Security• Encryption (portable devices)• Complex passwords• Do not exchange data using cloud/email unless encrypted• Backup data (and test it periodically)• Ensure confidential data is secure in locked offices, cabinets.• Take care when disposing of devices/records that hold or accessed sensitive data• Dark Archive
  9. 9. Dark Archive• The University’s Dark Archive will be part of the institutional repository where completed data sets which are not suitable to be made available on OA can be stored.
  10. 10. Freedom of InformationExemptions1. Information already accessible2. Information to be published at a future date3. Personal information4. Prejudice to commercial interests
  11. 11. Questions? Caroline Dominey Records Manager c.h.dominey@ex.ac.uk Tel. 01392 263033http://www.exeter.ac.uk/dataprotection/

×