SlideShare a Scribd company logo
1 of 11
Open Access: Data
Protection, Storage and
Sharing


               Caroline Dominey
Open Access is all about sharing research
freely and openly
                         -
Data Protection Act is all about protecting
people's rights in respect to how information
about them is used.
                         -
Freedom of Information provides right to
access official information held by public
authorities
                         -
Confidentiality in maintaining Trade Secrets &
commercial interests etc
Data Protection Act
• FAIR PROCESSING
  •   Fair
  •   Open and transparent
  •   Justified
  •   Reasonable


• SECURITY
  • Technical and Operational Measures to protect against
       • Unauthorised Access
       • Damage to the Data
       • Loss of Data
1. Can we ensure fair processing of personal data
   when it’s deposited in Open Access archives? If
   so, how?

2. How can we ensure the security of personal
   and confidential data throughout the research
   process and into Open Access Archives?
Fair Processing
•   Consent
•   Information for research participants
•   Contractual Clauses
•   Anonymisation (Raw Data vs. Articles)
•   Ethics
•   User Licences
•   Dark Archive
What to tell participants?
• Standard information (who you are, what you’re
  researching etc)
• What information are you collecting (photos, personal
  experiences)?
• Who will have access to the data? Can you guarantee
  that identities will be protected?
• Will data be placed in an archive? Who will be able to
  access this?
• What are they consenting to?
Anonymisation
•   Is it necessary? Oral histories, profiles
•   Time consuming
•   Removal of direct identifiers
•   Removal of indirect identifiers
•   Devalue research data?
•   Research publications vs outputs
Security
• Encryption (portable devices)
• Complex passwords
• Do not exchange data using cloud/email unless
  encrypted
• Backup data (and test it periodically)
• Ensure confidential data is secure in locked offices,
  cabinets.
• Take care when disposing of devices/records that hold
  or accessed sensitive data
• Dark Archive
Dark Archive
• The University’s Dark Archive will be part of the
  institutional repository where completed data sets which
  are not suitable to be made available on OA can be
  stored.
Freedom of Information

Exemptions

1.   Information already accessible
2.   Information to be published at a future date
3.   Personal information
4.   Prejudice to commercial interests
Questions?


           Caroline Dominey
           Records Manager
        c.h.dominey@ex.ac.uk
          Tel. 01392 263033
http://www.exeter.ac.uk/dataprotection/

More Related Content

What's hot

Maintaining confidentiality
Maintaining confidentialityMaintaining confidentiality
Maintaining confidentiality
empalmer
 

What's hot (15)

Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to data
 
GDRP
GDRPGDRP
GDRP
 
Gdpr real3
Gdpr real3Gdpr real3
Gdpr real3
 
Hippa privacy
Hippa privacyHippa privacy
Hippa privacy
 
Maintaining confidentiality
Maintaining confidentialityMaintaining confidentiality
Maintaining confidentiality
 
The role of intellectual property laws in business
The role of intellectual property laws in businessThe role of intellectual property laws in business
The role of intellectual property laws in business
 
Developing a privacy compliance program
Developing a privacy compliance programDeveloping a privacy compliance program
Developing a privacy compliance program
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
hacking
hackinghacking
hacking
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Io t privacy and security considerations
Io t   privacy and security considerationsIo t   privacy and security considerations
Io t privacy and security considerations
 
[webinar] From Ideas to Assets: Common Investor Pitfalls with Intellectual Pr...
[webinar] From Ideas to Assets: Common Investor Pitfalls with Intellectual Pr...[webinar] From Ideas to Assets: Common Investor Pitfalls with Intellectual Pr...
[webinar] From Ideas to Assets: Common Investor Pitfalls with Intellectual Pr...
 
ADD2016
ADD2016ADD2016
ADD2016
 
Working with Personal and Sensitive Research Data 12/11/20
Working with Personal and Sensitive Research Data 12/11/20Working with Personal and Sensitive Research Data 12/11/20
Working with Personal and Sensitive Research Data 12/11/20
 
Serianu - Data security
Serianu - Data securitySerianu - Data security
Serianu - Data security
 

Viewers also liked

Viewers also liked (9)

Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
2014 dpa training february nn
2014 dpa training february nn2014 dpa training february nn
2014 dpa training february nn
 
Datastewards
DatastewardsDatastewards
Datastewards
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud Computing
 
Red7 Medical Identity Security and Data Protection
Red7 Medical Identity Security and Data ProtectionRed7 Medical Identity Security and Data Protection
Red7 Medical Identity Security and Data Protection
 
ESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection Regulation
 
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...
 
Medical device data protection and security
Medical device data protection and security Medical device data protection and security
Medical device data protection and security
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011
 

Similar to Open Access: Data Protection, Storage and Sharing

Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
Nicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
Nicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
Nicholas Davis
 
Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)
brentcarey
 
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedManaging Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Rob Daley
 
Bishop open qual_recode_sheffield_14_15may2015 (3)
Bishop open qual_recode_sheffield_14_15may2015 (3)Bishop open qual_recode_sheffield_14_15may2015 (3)
Bishop open qual_recode_sheffield_14_15may2015 (3)
Thordis Sveinsdottir
 

Similar to Open Access: Data Protection, Storage and Sharing (20)

Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
Ethical and legal issues in making research data open
Ethical and legal issues in making research data openEthical and legal issues in making research data open
Ethical and legal issues in making research data open
 
Librarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research dataLibrarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research data
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Preparing research data for sharing
Preparing research data for sharingPreparing research data for sharing
Preparing research data for sharing
 
Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of Things
 
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedManaging Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
 
20160523 23 Research Data Things
20160523 23 Research Data Things20160523 23 Research Data Things
20160523 23 Research Data Things
 
Introduction to Research Data Management for postgraduate students
Introduction to Research Data Management for postgraduate studentsIntroduction to Research Data Management for postgraduate students
Introduction to Research Data Management for postgraduate students
 
Open science, open data - FOSTER training, Potsdam
Open science, open data - FOSTER training, PotsdamOpen science, open data - FOSTER training, Potsdam
Open science, open data - FOSTER training, Potsdam
 
Innovative Ideas in Privacy Research.ppt
Innovative Ideas in Privacy Research.pptInnovative Ideas in Privacy Research.ppt
Innovative Ideas in Privacy Research.ppt
 
dexa.ppt
dexa.pptdexa.ppt
dexa.ppt
 
CERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data ProtectionCERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data Protection
 
Guy avoiding-dat apocalypse
Guy avoiding-dat apocalypseGuy avoiding-dat apocalypse
Guy avoiding-dat apocalypse
 
Making Qualitative Data Open - Libby Bishop, UK Data Service
Making Qualitative Data Open - Libby Bishop, UK Data ServiceMaking Qualitative Data Open - Libby Bishop, UK Data Service
Making Qualitative Data Open - Libby Bishop, UK Data Service
 
Bishop open qual_recode_sheffield_14_15may2015 (3)
Bishop open qual_recode_sheffield_14_15may2015 (3)Bishop open qual_recode_sheffield_14_15may2015 (3)
Bishop open qual_recode_sheffield_14_15may2015 (3)
 
4-Privacy1.pptx
4-Privacy1.pptx4-Privacy1.pptx
4-Privacy1.pptx
 

More from OpenExeter

Tracking Digital Impact - A Quick Introduction
Tracking Digital Impact - A Quick IntroductionTracking Digital Impact - A Quick Introduction
Tracking Digital Impact - A Quick Introduction
OpenExeter
 
The Wellcome Trust - Margaret Hurley
The Wellcome Trust - Margaret HurleyThe Wellcome Trust - Margaret Hurley
The Wellcome Trust - Margaret Hurley
OpenExeter
 
Open Access Week @Exeter - Cameron Neylon
Open Access Week @Exeter - Cameron NeylonOpen Access Week @Exeter - Cameron Neylon
Open Access Week @Exeter - Cameron Neylon
OpenExeter
 

More from OpenExeter (17)

Tracking Digital Impact - A Quick Introduction
Tracking Digital Impact - A Quick IntroductionTracking Digital Impact - A Quick Introduction
Tracking Digital Impact - A Quick Introduction
 
The Wellcome Trust - Margaret Hurley
The Wellcome Trust - Margaret HurleyThe Wellcome Trust - Margaret Hurley
The Wellcome Trust - Margaret Hurley
 
Tracking Digital Impact: A Quick Introduction
Tracking Digital Impact: A Quick IntroductionTracking Digital Impact: A Quick Introduction
Tracking Digital Impact: A Quick Introduction
 
Open Access Week @Exeter - Cameron Neylon
Open Access Week @Exeter - Cameron NeylonOpen Access Week @Exeter - Cameron Neylon
Open Access Week @Exeter - Cameron Neylon
 
Disruptive Dissemination of Research Outputs
Disruptive Dissemination of Research OutputsDisruptive Dissemination of Research Outputs
Disruptive Dissemination of Research Outputs
 
UKDA Research Data Management
UKDA Research Data ManagementUKDA Research Data Management
UKDA Research Data Management
 
Benefits of open access exeter 2012
Benefits of open access exeter 2012Benefits of open access exeter 2012
Benefits of open access exeter 2012
 
The benefits of open access
The benefits of open accessThe benefits of open access
The benefits of open access
 
Research Data Management: An Introduction to the Basics
Research Data Management: An Introduction to the BasicsResearch Data Management: An Introduction to the Basics
Research Data Management: An Introduction to the Basics
 
Developing Open Access and Research Data Management Policy
Developing Open Access and Research Data Management PolicyDeveloping Open Access and Research Data Management Policy
Developing Open Access and Research Data Management Policy
 
Research Excellence Framework 2014 and Open Access
Research Excellence Framework 2014 and Open AccessResearch Excellence Framework 2014 and Open Access
Research Excellence Framework 2014 and Open Access
 
Going for Gold? The RCUK Policy on Access to Research Outputs
Going for Gold? The RCUK Policy on Access to Research OutputsGoing for Gold? The RCUK Policy on Access to Research Outputs
Going for Gold? The RCUK Policy on Access to Research Outputs
 
Open Access Repositories
Open Access RepositoriesOpen Access Repositories
Open Access Repositories
 
Open Access and Research Data Management
Open Access and Research Data ManagementOpen Access and Research Data Management
Open Access and Research Data Management
 
How to write a data management plan
How to write a data management planHow to write a data management plan
How to write a data management plan
 
Brian kelly: Open practices for the connected researcher
Brian kelly: Open practices for the connected researcherBrian kelly: Open practices for the connected researcher
Brian kelly: Open practices for the connected researcher
 
Open Access Week @Exeter - Alma Swan
Open Access Week @Exeter - Alma SwanOpen Access Week @Exeter - Alma Swan
Open Access Week @Exeter - Alma Swan
 

Open Access: Data Protection, Storage and Sharing

  • 1. Open Access: Data Protection, Storage and Sharing Caroline Dominey
  • 2. Open Access is all about sharing research freely and openly - Data Protection Act is all about protecting people's rights in respect to how information about them is used. - Freedom of Information provides right to access official information held by public authorities - Confidentiality in maintaining Trade Secrets & commercial interests etc
  • 3. Data Protection Act • FAIR PROCESSING • Fair • Open and transparent • Justified • Reasonable • SECURITY • Technical and Operational Measures to protect against • Unauthorised Access • Damage to the Data • Loss of Data
  • 4. 1. Can we ensure fair processing of personal data when it’s deposited in Open Access archives? If so, how? 2. How can we ensure the security of personal and confidential data throughout the research process and into Open Access Archives?
  • 5. Fair Processing • Consent • Information for research participants • Contractual Clauses • Anonymisation (Raw Data vs. Articles) • Ethics • User Licences • Dark Archive
  • 6. What to tell participants? • Standard information (who you are, what you’re researching etc) • What information are you collecting (photos, personal experiences)? • Who will have access to the data? Can you guarantee that identities will be protected? • Will data be placed in an archive? Who will be able to access this? • What are they consenting to?
  • 7. Anonymisation • Is it necessary? Oral histories, profiles • Time consuming • Removal of direct identifiers • Removal of indirect identifiers • Devalue research data? • Research publications vs outputs
  • 8. Security • Encryption (portable devices) • Complex passwords • Do not exchange data using cloud/email unless encrypted • Backup data (and test it periodically) • Ensure confidential data is secure in locked offices, cabinets. • Take care when disposing of devices/records that hold or accessed sensitive data • Dark Archive
  • 9. Dark Archive • The University’s Dark Archive will be part of the institutional repository where completed data sets which are not suitable to be made available on OA can be stored.
  • 10. Freedom of Information Exemptions 1. Information already accessible 2. Information to be published at a future date 3. Personal information 4. Prejudice to commercial interests
  • 11. Questions? Caroline Dominey Records Manager c.h.dominey@ex.ac.uk Tel. 01392 263033 http://www.exeter.ac.uk/dataprotection/