SlideShare a Scribd company logo
@EOSC_eu@OpenAIRE_eu |
www.eosc-hub.eu
www.openaire.eu
6th December 2018
data privacy and sensitive data
Elli Papadopoulou
Librarian at Athena R.C. /
OpenAIRE NOAD for Greece
Data Processing
6th December 2018
1. Data Processing
2. Data Privacy &
Sensitive Data
● What is data processing
● Where is it positioned in a data
management lifecycle
● What are its components
● What are the key elements of data
privacy
● How to handle sensitive data
6th December 2018
1. Data Processing
• the operational phase during which raw data is being manipulated to
result to meaningful information
• what data? textual, images, audio (and their metadata!)
- electronic, digital, analog, physical
What is Data Processing
6th December 2018
• Handling/curation of data
• Between data collection and
data preservation
• Involves processes such as:
ingestion, aggregation,
analysis, classification,
metadata enrichment,
organisation, validation,
storing, etc.
• There might be re-processing
of data (e.g. data migration)
• Data disposal
Data Management
Lifecycle
Data Processing
6th December 2018
-Type of data: what has been used or generated (e.g. software) during research
process and support/validate its outcomes
-Format of data: one format for analysis and then convert to a standard format (more
sustainable: .rtf, .xml, .tif, .wav; proprietary: .doc, .jpg, .mp3)
-Metadata: use metadata standards
-Persistent Identifiers (PIDs): a long lasting reference to a document, file or other
object - many repositories will assign them in deposit
● (Research) Data Management policies or repository policies -
retention, withdrawal, format, metadata standards, storage, etc
Data Processing in a Data Management Plan and FAIR manner
2. Data Privacy &
Sensitive Data
In force since 25 May 2018
Data Privacy or Data Protection - The legal framework
Intellectual Property Rights -
Copyright
Also: Trade secrets directive &
unitary patent system
- Personal data (and metadata)
- Confidential data (trade secrets, investigations,...)
- Security data (passwords, financial information,
national safety, military,….)
- Data protected by Intellectual Property Rights (IPR)
- Location Data/GPS/mobile phones
- Endangered (plant or animal) species, where their
survival is dependent on the protection of their
location data (biodiversity community)
- Combination of different datasets could lead to
sensitive data?
Types of sensitive data
- racial or ethnic origin
- political opinions
- religious or philosophical
beliefs
- trade union membership
- genetic data, biometric data
- physical or mental health
- sex life or sexual orientation
- criminal offences
- Access controls
- passwords, firewall (viruses,
hacking)
- Anonymisation
- removing or aggregating variables
or reducing the precision or detailed
textual meaning of a variable
- Encryption
- encoded digital information
Data Security and Sensitive data - best practices
- Share in a secure place
- no cloud drives
- Store in an isolated machine
- server not connected to
Internet
- Secure disposal
- no data recovery is possible
(uninstall)
- DANs https://dans.knaw.nl/en/training-consultancy
- UK Data Archive https://www.ukdataservice.ac.uk/manage-data
- CESSDA Data Management Expert Guide
https://www.cessda.eu/Training/Training-Resources/Library/Data-
Management-Expert-Guide
- DCC Curation Lifecycle Lifecycle
http://www.dcc.ac.uk/resources/curation-lifecycle-model
- Amnesia (anonymisation tool) https://amnesia.openaire.eu/
Useful Resources
@EOSC_eu
@openaire_eu
Questions ?
Elli Papadopoulou
elli.p@imis.athena-innovation.gr
Thank you!

More Related Content

What's hot

The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
SaimaRafiq
 

What's hot (20)

Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Data security
Data securityData security
Data security
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 
General data protection
General data protectionGeneral data protection
General data protection
 
Data security
Data securityData security
Data security
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Information security
Information securityInformation security
Information security
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Data protection
Data protectionData protection
Data protection
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 

Similar to Data Processing - data privacy and sensitive data

Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Frank Dawson
 
POPH: Archival Research and Data Protection: Why are some archives closed? - ...
POPH: Archival Research and Data Protection: Why are some archives closed? - ...POPH: Archival Research and Data Protection: Why are some archives closed? - ...
POPH: Archival Research and Data Protection: Why are some archives closed? - ...
Leah Henrickson
 
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard
 

Similar to Data Processing - data privacy and sensitive data (20)

Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf
 
Effective Information Management V2 18sep2008
Effective Information Management V2 18sep2008Effective Information Management V2 18sep2008
Effective Information Management V2 18sep2008
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
 
Legal and ethical considerations for sharing research data
Legal and ethical considerations for sharing research dataLegal and ethical considerations for sharing research data
Legal and ethical considerations for sharing research data
 
POPH: Archival Research and Data Protection: Why are some archives closed? - ...
POPH: Archival Research and Data Protection: Why are some archives closed? - ...POPH: Archival Research and Data Protection: Why are some archives closed? - ...
POPH: Archival Research and Data Protection: Why are some archives closed? - ...
 
Tech Matrix 20080523
Tech Matrix 20080523Tech Matrix 20080523
Tech Matrix 20080523
 
Course 5: GDPR & Big Data by Sari Depreeuw
Course 5: GDPR & Big Data by Sari DepreeuwCourse 5: GDPR & Big Data by Sari Depreeuw
Course 5: GDPR & Big Data by Sari Depreeuw
 
Data Protection GDPR Basics
Data Protection GDPR BasicsData Protection GDPR Basics
Data Protection GDPR Basics
 
pr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdfpr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdf
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
 
Privacy by Design: legal perspective
Privacy by Design: legal perspectivePrivacy by Design: legal perspective
Privacy by Design: legal perspective
 
Access now : Data Protection: What you should know about it?
Access now : Data Protection: What you should know about it?Access now : Data Protection: What you should know about it?
Access now : Data Protection: What you should know about it?
 
TIK_4. pengelolaan informasi_20161__rev
TIK_4. pengelolaan informasi_20161__revTIK_4. pengelolaan informasi_20161__rev
TIK_4. pengelolaan informasi_20161__rev
 
Personal data: Legal Issues in Research Data Collection and Sharing by EUDAT ...
Personal data: Legal Issues in Research Data Collection and Sharing by EUDAT ...Personal data: Legal Issues in Research Data Collection and Sharing by EUDAT ...
Personal data: Legal Issues in Research Data Collection and Sharing by EUDAT ...
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository
 
L2 - Protecting Security of Assets_.pptx
L2 - Protecting Security of Assets_.pptxL2 - Protecting Security of Assets_.pptx
L2 - Protecting Security of Assets_.pptx
 
Webinar: An EU regulation affecting companies worldwide - GDPR
Webinar: An EU regulation affecting companies worldwide - GDPRWebinar: An EU regulation affecting companies worldwide - GDPR
Webinar: An EU regulation affecting companies worldwide - GDPR
 
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
 

More from OpenAIRE

More from OpenAIRE (20)

10th OpenAIRE Content Providers Community Call
10th OpenAIRE Content Providers Community Call10th OpenAIRE Content Providers Community Call
10th OpenAIRE Content Providers Community Call
 
9th Content Providers Community Call\
9th Content Providers Community Call\9th Content Providers Community Call\
9th Content Providers Community Call\
 
OpenAIRE in the European Open Science Cloud (EOSC)
OpenAIRE in the European Open Science Cloud (EOSC)OpenAIRE in the European Open Science Cloud (EOSC)
OpenAIRE in the European Open Science Cloud (EOSC)
 
8th Content Providers Community Call
8th Content Providers Community Call8th Content Providers Community Call
8th Content Providers Community Call
 
7th Content Providers Community Call
7th Content Providers Community Call7th Content Providers Community Call
7th Content Providers Community Call
 
OpenAIRE PROVIDE Dashboard for Turkish repository managers
OpenAIRE PROVIDE Dashboard for Turkish repository managersOpenAIRE PROVIDE Dashboard for Turkish repository managers
OpenAIRE PROVIDE Dashboard for Turkish repository managers
 
What will it cost to manage and share my data?
What will it cost to manage and share my data?What will it cost to manage and share my data?
What will it cost to manage and share my data?
 
Open Research Gateway for the ELIXIR-GR Infrastructure (Part 3)
Open Research Gateway for the ELIXIR-GR Infrastructure (Part 3)Open Research Gateway for the ELIXIR-GR Infrastructure (Part 3)
Open Research Gateway for the ELIXIR-GR Infrastructure (Part 3)
 
Open Research Gateway for the ELIXIR-GR Infrastructure (Part 2)
Open Research Gateway for the ELIXIR-GR Infrastructure (Part 2)Open Research Gateway for the ELIXIR-GR Infrastructure (Part 2)
Open Research Gateway for the ELIXIR-GR Infrastructure (Part 2)
 
Open Research Gateway for the ELIXIR-GR Infrastructure (Part 1)
Open Research Gateway for the ELIXIR-GR Infrastructure (Part 1)Open Research Gateway for the ELIXIR-GR Infrastructure (Part 1)
Open Research Gateway for the ELIXIR-GR Infrastructure (Part 1)
 
6th Content Providers Community Call
6th Content Providers Community Call6th Content Providers Community Call
6th Content Providers Community Call
 
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
20200504_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
 
20200504_Research Data & the GDPR: How Open is Open?
20200504_Research Data & the GDPR: How Open is Open?20200504_Research Data & the GDPR: How Open is Open?
20200504_Research Data & the GDPR: How Open is Open?
 
20200504_Data, Data Ownership and Open Science
20200504_Data, Data Ownership and Open Science20200504_Data, Data Ownership and Open Science
20200504_Data, Data Ownership and Open Science
 
20200429_Research Data & the GDPR: How Open is Open? (updated version)
20200429_Research Data & the GDPR: How Open is Open? (updated version)20200429_Research Data & the GDPR: How Open is Open? (updated version)
20200429_Research Data & the GDPR: How Open is Open? (updated version)
 
20200429_Data, Data Ownership and Open Science
20200429_Data, Data Ownership and Open Science20200429_Data, Data Ownership and Open Science
20200429_Data, Data Ownership and Open Science
 
20200429_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
20200429_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data20200429_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
20200429_OpenAIRE Legal Policy Webinar: GDPR and Sharing Data
 
COVID-19: Activities, tools, best practice and contact points in Greece
 COVID-19: Activities, tools, best practice and contact points in Greece COVID-19: Activities, tools, best practice and contact points in Greece
COVID-19: Activities, tools, best practice and contact points in Greece
 
5th Content Providers Community Call
5th Content Providers Community Call5th Content Providers Community Call
5th Content Providers Community Call
 
4th Content Providers Community Call
4th Content Providers Community Call4th Content Providers Community Call
4th Content Providers Community Call
 

Recently uploaded

FAIR & AI Ready KGs for Explainable Predictions
FAIR & AI Ready KGs for Explainable PredictionsFAIR & AI Ready KGs for Explainable Predictions
FAIR & AI Ready KGs for Explainable Predictions
Michel Dumontier
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Sérgio Sacani
 
Anemia_ different types_causes_ conditions
Anemia_ different types_causes_ conditionsAnemia_ different types_causes_ conditions
Anemia_ different types_causes_ conditions
muralinath2
 
platelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptxplatelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptx
muralinath2
 
Penicillin...........................pptx
Penicillin...........................pptxPenicillin...........................pptx
Penicillin...........................pptx
Cherry
 
extra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdfextra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdf
DiyaBiswas10
 
Mammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also FunctionsMammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also Functions
YOGESH DOGRA
 
ESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptxESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptx
muralinath2
 

Recently uploaded (20)

FAIR & AI Ready KGs for Explainable Predictions
FAIR & AI Ready KGs for Explainable PredictionsFAIR & AI Ready KGs for Explainable Predictions
FAIR & AI Ready KGs for Explainable Predictions
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
 
Anemia_ different types_causes_ conditions
Anemia_ different types_causes_ conditionsAnemia_ different types_causes_ conditions
Anemia_ different types_causes_ conditions
 
Transport in plants G1.pptx Cambridge IGCSE
Transport in plants G1.pptx Cambridge IGCSETransport in plants G1.pptx Cambridge IGCSE
Transport in plants G1.pptx Cambridge IGCSE
 
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
 
In silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptxIn silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptx
 
GEOLOGICAL FIELD REPORT On Kaptai Rangamati Road-Cut Section.pdf
GEOLOGICAL FIELD REPORT  On  Kaptai Rangamati Road-Cut Section.pdfGEOLOGICAL FIELD REPORT  On  Kaptai Rangamati Road-Cut Section.pdf
GEOLOGICAL FIELD REPORT On Kaptai Rangamati Road-Cut Section.pdf
 
Predicting property prices with machine learning algorithms.pdf
Predicting property prices with machine learning algorithms.pdfPredicting property prices with machine learning algorithms.pdf
Predicting property prices with machine learning algorithms.pdf
 
Structures and textures of metamorphic rocks
Structures and textures of metamorphic rocksStructures and textures of metamorphic rocks
Structures and textures of metamorphic rocks
 
platelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptxplatelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptx
 
Penicillin...........................pptx
Penicillin...........................pptxPenicillin...........................pptx
Penicillin...........................pptx
 
Microbial Type Culture Collection (MTCC)
Microbial Type Culture Collection (MTCC)Microbial Type Culture Collection (MTCC)
Microbial Type Culture Collection (MTCC)
 
GLOBAL AND LOCAL SCENARIO OF FOOD AND NUTRITION.pptx
GLOBAL AND LOCAL SCENARIO OF FOOD AND NUTRITION.pptxGLOBAL AND LOCAL SCENARIO OF FOOD AND NUTRITION.pptx
GLOBAL AND LOCAL SCENARIO OF FOOD AND NUTRITION.pptx
 
extra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdfextra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdf
 
Shuaib Y-basedComprehensive mahmudj.pptx
Shuaib Y-basedComprehensive mahmudj.pptxShuaib Y-basedComprehensive mahmudj.pptx
Shuaib Y-basedComprehensive mahmudj.pptx
 
Mammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also FunctionsMammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also Functions
 
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdfSCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
 
ESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptxESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptx
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
 
Multi-source connectivity as the driver of solar wind variability in the heli...
Multi-source connectivity as the driver of solar wind variability in the heli...Multi-source connectivity as the driver of solar wind variability in the heli...
Multi-source connectivity as the driver of solar wind variability in the heli...
 

Data Processing - data privacy and sensitive data

  • 2. data privacy and sensitive data Elli Papadopoulou Librarian at Athena R.C. / OpenAIRE NOAD for Greece Data Processing 6th December 2018
  • 3. 1. Data Processing 2. Data Privacy & Sensitive Data ● What is data processing ● Where is it positioned in a data management lifecycle ● What are its components ● What are the key elements of data privacy ● How to handle sensitive data 6th December 2018
  • 5. • the operational phase during which raw data is being manipulated to result to meaningful information • what data? textual, images, audio (and their metadata!) - electronic, digital, analog, physical What is Data Processing 6th December 2018
  • 6. • Handling/curation of data • Between data collection and data preservation • Involves processes such as: ingestion, aggregation, analysis, classification, metadata enrichment, organisation, validation, storing, etc. • There might be re-processing of data (e.g. data migration) • Data disposal Data Management Lifecycle Data Processing 6th December 2018
  • 7. -Type of data: what has been used or generated (e.g. software) during research process and support/validate its outcomes -Format of data: one format for analysis and then convert to a standard format (more sustainable: .rtf, .xml, .tif, .wav; proprietary: .doc, .jpg, .mp3) -Metadata: use metadata standards -Persistent Identifiers (PIDs): a long lasting reference to a document, file or other object - many repositories will assign them in deposit ● (Research) Data Management policies or repository policies - retention, withdrawal, format, metadata standards, storage, etc Data Processing in a Data Management Plan and FAIR manner
  • 8. 2. Data Privacy & Sensitive Data
  • 9. In force since 25 May 2018 Data Privacy or Data Protection - The legal framework Intellectual Property Rights - Copyright Also: Trade secrets directive & unitary patent system
  • 10. - Personal data (and metadata) - Confidential data (trade secrets, investigations,...) - Security data (passwords, financial information, national safety, military,….) - Data protected by Intellectual Property Rights (IPR) - Location Data/GPS/mobile phones - Endangered (plant or animal) species, where their survival is dependent on the protection of their location data (biodiversity community) - Combination of different datasets could lead to sensitive data? Types of sensitive data - racial or ethnic origin - political opinions - religious or philosophical beliefs - trade union membership - genetic data, biometric data - physical or mental health - sex life or sexual orientation - criminal offences
  • 11. - Access controls - passwords, firewall (viruses, hacking) - Anonymisation - removing or aggregating variables or reducing the precision or detailed textual meaning of a variable - Encryption - encoded digital information Data Security and Sensitive data - best practices - Share in a secure place - no cloud drives - Store in an isolated machine - server not connected to Internet - Secure disposal - no data recovery is possible (uninstall)
  • 12. - DANs https://dans.knaw.nl/en/training-consultancy - UK Data Archive https://www.ukdataservice.ac.uk/manage-data - CESSDA Data Management Expert Guide https://www.cessda.eu/Training/Training-Resources/Library/Data- Management-Expert-Guide - DCC Curation Lifecycle Lifecycle http://www.dcc.ac.uk/resources/curation-lifecycle-model - Amnesia (anonymisation tool) https://amnesia.openaire.eu/ Useful Resources