SlideShare a Scribd company logo
Librarian RDM Training
Week 4: Ethics and copyright




   Robin Rice, Data Librarian
     Information Services
   Edinburgh: 5 December, 2012
Learning objectives
• Be aware of ethical requirements that apply to
  the collection and management of data involving
  human subjects.
• Understand the difference between privacy and
  confidentiality and how they apply to the
  management of research data.
• Know what IPR is and how it applies to your
  [users‟] research data.
Ethics of collecting data on
        human subjects
• The purpose and nature of the research
  itself
• The nature of consent obtained (e.g. opt-in
  versus opt-out participation)
• What data needs to be safeguarded during
  analysis and destroyed after its use
Which research is subject to
        ethical review?
• Using human participants or live animals
• Referencing individual subjects (people)
• Keeping identifiers for individuals
EXEMPT from ethics review
• freely available in the public domain, or
• obtained through pure observational
  studies of public behaviour:
        – are of human action that occurs in a forum open to the
          general public
        – are non-invasive
        – require no interaction with participants
        – do not identify participants
Some scholarly societies with
       ethics guidelines
• Association of Social Anthropologists of
  the UK and the Commonwealth
• British Association of Social Workers
• British Psychological Society
• British Educational Research Association
• British Society of Criminology
• British Sociological Association
• Social Research Association
Privacy and research
• Individuals are normally considered to have a
  „right to privacy‟ - the state of being free from
  intrusion or disturbance in one's private life or
  affairs.
• Research proposals need to indicate how data
  will be collected about human subjects. Ethical
  reviews will consider how intrusive this is for the
  subjects.
• The right to privacy implies the need to obtain
  consent from research subjects.
Confidentiality and research
• Oftentimes the consent form will include a
  promise to the subject that the researcher will
  not disclose confidential information.
• Keeping this agreement implies controls on
  storage, handling, and sharing of personal data.
• Strategies can include
  – If possible, collect the necessary data without using personally
    identifying information.
  – If personally identifying information is required, de-identify your
    data upon collection or as soon as possible thereafter.
  – Avoid transmitting unencrypted personal data electronically.
Intellectual Property Rights
• Intellectual Property Rights (IPR) can be defined
  as rights acquired over any work created or
  invented with the intellectual effort of an
  individual. These rights are time-limited and do
  not require explicit assertion.
• Owners of works are granted exclusive rights
  – to publish the work
  – to license the work‟s distribution to others
  – to sue in case of unlawful or deceptive copying
• It may be possible to waive these rights through
  a public declaration similar to a licence.
When do data enjoy copyright
          in the UK?
• When the dataset is an expressive work
  – Even if not, the metadata may enjoy copyright
• What if the data are merely a set of facts?
  – A simple list or spreadsheet might not enjoy copyright
  – The EU established a „database right‟ („sui generis‟
    right) to protect substantial investment made by
    database producers in obtaining, verifying and
    presenting database contents.
  – Also, the structure of the database, including the
    selection and arrangement of the database‟s contents
    may meet a test of intellectual creativity bestowing
    copyright.
Better not count on it though…
• What does “in the public domain” mean? Not
  everyone on the internet understands copyright
  is implicit.
• “Insubstantial amounts” of databases may be
  copied, but there is not a lot of case law to
  determine how much that is: under 50%?
• “Screen scraping” is a common method of
  obtaining raw data from online sources. This
  may be lawful, depending on what gets
  published.
To be continued…
• Data licensing to be covered in next session
• An advantage of data licensing is ability to be
  explicit about what can and cannot be done with
  the data obtained, compared with copyright.
• However, if a licence is breached, any third party
  who obtains the data is not under its obligation!
• A time-limited embargo in a repository may help
  data creators to gain time to publish results first.
Last word
• Best to create a public use dataset that you are
  comfortable about getting used, if putting online.
• And don‟t forget the Freedom of Information Act
  and related legislation may compel you to
  release data, especially if in the public interest!
Librarian RDM Training: Ethics and copyright for research data

More Related Content

What's hot

Copyright and-intellectual-property-final
Copyright and-intellectual-property-finalCopyright and-intellectual-property-final
Copyright and-intellectual-property-finalApoorva Arora
 
Legal & ethical issues
Legal & ethical issuesLegal & ethical issues
Legal & ethical issuesmiajay414
 
Maintaining confidentiality
Maintaining confidentialityMaintaining confidentiality
Maintaining confidentialityempalmer
 
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...
dri_ireland
 
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...
FutureTDM
 
Freedom of Information Act requests - HR and employment conference for school...
Freedom of Information Act requests - HR and employment conference for school...Freedom of Information Act requests - HR and employment conference for school...
Freedom of Information Act requests - HR and employment conference for school...
Browne Jacobson LLP
 
Information ethics
Information ethicsInformation ethics
Information ethicsSTCC Library
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsDan Michaluk
 
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...Where is the Share Button? Intellectual Property Issues Surrounding Data for ...
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...
Rebekah Cummings
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
Nazrul Islam
 
Legal issues
Legal issuesLegal issues
Legal issues
DecardoDay
 
Complying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case studyComplying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case study
GarethKnight
 
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)
Yokimura Dimaunahan
 
Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Test Security
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and TechnologyMr Shipp
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
Laguna State Polytechnic University
 
Privacy in Bigdata Era
Privacy in Bigdata  EraPrivacy in Bigdata  Era
Privacy in Bigdata Era
Srinath Perera
 
Information ethics: Introducing our course
Information ethics: Introducing our courseInformation ethics: Introducing our course
Information ethics: Introducing our course
Jenny Delasalle
 
Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...
Alexandra Deschamps-Sonsino
 

What's hot (20)

Copyright and-intellectual-property-final
Copyright and-intellectual-property-finalCopyright and-intellectual-property-final
Copyright and-intellectual-property-final
 
Legal & ethical issues
Legal & ethical issuesLegal & ethical issues
Legal & ethical issues
 
Querying Patent Data for Empirical Scholarship : Tools and Strategies
Querying Patent Data for Empirical Scholarship : Tools and StrategiesQuerying Patent Data for Empirical Scholarship : Tools and Strategies
Querying Patent Data for Empirical Scholarship : Tools and Strategies
 
Maintaining confidentiality
Maintaining confidentialityMaintaining confidentiality
Maintaining confidentiality
 
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...
 
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...
 
Freedom of Information Act requests - HR and employment conference for school...
Freedom of Information Act requests - HR and employment conference for school...Freedom of Information Act requests - HR and employment conference for school...
Freedom of Information Act requests - HR and employment conference for school...
 
Information ethics
Information ethicsInformation ethics
Information ethics
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy laws
 
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...Where is the Share Button? Intellectual Property Issues Surrounding Data for ...
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Legal issues
Legal issuesLegal issues
Legal issues
 
Complying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case studyComplying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case study
 
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)
 
Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Privacy in Bigdata Era
Privacy in Bigdata  EraPrivacy in Bigdata  Era
Privacy in Bigdata Era
 
Information ethics: Introducing our course
Information ethics: Introducing our courseInformation ethics: Introducing our course
Information ethics: Introducing our course
 
Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...
 

Similar to Librarian RDM Training: Ethics and copyright for research data

Preparing Research Data for Sharing
Preparing Research Data for SharingPreparing Research Data for Sharing
Preparing Research Data for Sharing
London School of Hygiene and Tropical Medicine
 
Open Government Data: Understanding Open Access vs. Public Domain
Open Government Data: Understanding Open Access vs. Public DomainOpen Government Data: Understanding Open Access vs. Public Domain
Open Government Data: Understanding Open Access vs. Public Domain
Jennifer C. Boettcher
 
chapter05 (1).ppt
chapter05 (1).pptchapter05 (1).ppt
chapter05 (1).ppt
HudaElMaghraby1
 
Access and licencing of data
Access and licencing of dataAccess and licencing of data
Access and licencing of data
Arhiv družboslovnih podatkov
 
20160523 23 Research Data Things
20160523 23 Research Data Things20160523 23 Research Data Things
20160523 23 Research Data Things
Katina Toufexis
 
4-Privacy1.pptx
4-Privacy1.pptx4-Privacy1.pptx
4-Privacy1.pptx
SherifElGohary7
 
FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?
Robin Rice
 
Preparing research data for sharing
Preparing research data for sharingPreparing research data for sharing
Preparing research data for sharing
London School of Hygiene and Tropical Medicine
 
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...
SURFevents
 
Data sharing: Legal and ethical issues
Data sharing: Legal and ethical issuesData sharing: Legal and ethical issues
Data sharing: Legal and ethical issues
dancrane_open
 
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
ICPSR
 
IFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxIFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptx
EyalClyne
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of Information
Fiona Beals
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
Micah Altman
 
Clinical research ethics and regulation
Clinical research ethics and regulationClinical research ethics and regulation
Clinical research ethics and regulation
Roger Watson
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptx
PallawiBulakh1
 
FSCI Sharing sensitive data
FSCI Sharing sensitive dataFSCI Sharing sensitive data
FSCI Sharing sensitive data
ARDC
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
Adam Thierer
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
Charleston Conference
 

Similar to Librarian RDM Training: Ethics and copyright for research data (20)

Preparing Research Data for Sharing
Preparing Research Data for SharingPreparing Research Data for Sharing
Preparing Research Data for Sharing
 
Open Government Data: Understanding Open Access vs. Public Domain
Open Government Data: Understanding Open Access vs. Public DomainOpen Government Data: Understanding Open Access vs. Public Domain
Open Government Data: Understanding Open Access vs. Public Domain
 
chapter05 (1).ppt
chapter05 (1).pptchapter05 (1).ppt
chapter05 (1).ppt
 
Access and licencing of data
Access and licencing of dataAccess and licencing of data
Access and licencing of data
 
20160523 23 Research Data Things
20160523 23 Research Data Things20160523 23 Research Data Things
20160523 23 Research Data Things
 
4-Privacy1.pptx
4-Privacy1.pptx4-Privacy1.pptx
4-Privacy1.pptx
 
FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?
 
Preparing research data for sharing
Preparing research data for sharingPreparing research data for sharing
Preparing research data for sharing
 
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...
 
Data sharing: Legal and ethical issues
Data sharing: Legal and ethical issuesData sharing: Legal and ethical issues
Data sharing: Legal and ethical issues
 
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
 
IFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxIFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptx
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of Information
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
Clinical research ethics and regulation
Clinical research ethics and regulationClinical research ethics and regulation
Clinical research ethics and regulation
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptx
 
FSCI Sharing sensitive data
FSCI Sharing sensitive dataFSCI Sharing sensitive data
FSCI Sharing sensitive data
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 

More from Robin Rice

Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to data
Robin Rice
 
Research Data Support at the University of Edinburgh
Research Data Support at the University of EdinburghResearch Data Support at the University of Edinburgh
Research Data Support at the University of Edinburgh
Robin Rice
 
Research Data Service at the University of Edinburgh
Research Data Service at the University of EdinburghResearch Data Service at the University of Edinburgh
Research Data Service at the University of Edinburgh
Robin Rice
 
Research data support: a growth area for academic libraries?
Research data support: a growth area for academic libraries?Research data support: a growth area for academic libraries?
Research data support: a growth area for academic libraries?
Robin Rice
 
Staffing Research Data Services at University of Edinburgh
Staffing Research Data Services at University of EdinburghStaffing Research Data Services at University of Edinburgh
Staffing Research Data Services at University of Edinburgh
Robin Rice
 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governance
Robin Rice
 
The University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service SuiteThe University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service Suite
Robin Rice
 
RDM Roadmap to the Future, or: Lords and Ladies of the Data
RDM Roadmap to the Future, or: Lords and Ladies of the DataRDM Roadmap to the Future, or: Lords and Ladies of the Data
RDM Roadmap to the Future, or: Lords and Ladies of the Data
Robin Rice
 
Policies, procedures and standards for managing content in repositories.
Policies, procedures and standards for managing content in repositories.Policies, procedures and standards for managing content in repositories.
Policies, procedures and standards for managing content in repositories.
Robin Rice
 
Providing research data services in changing times
Providing research data services in changing timesProviding research data services in changing times
Providing research data services in changing times
Robin Rice
 
The University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service SuiteThe University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service Suite
Robin Rice
 
Supporting researchers in managing data
Supporting researchers in managing dataSupporting researchers in managing data
Supporting researchers in managing data
Robin Rice
 
Managing active research in the University of Edinburgh
Managing active research in the University of EdinburghManaging active research in the University of Edinburgh
Managing active research in the University of Edinburgh
Robin Rice
 
Designing and delivering an international MOOC on Research Data Management an...
Designing and delivering an international MOOC on Research Data Management an...Designing and delivering an international MOOC on Research Data Management an...
Designing and delivering an international MOOC on Research Data Management an...
Robin Rice
 
University of Edinburgh RDM Training: MANTRA & beyond
University of Edinburgh RDM Training: MANTRA & beyondUniversity of Edinburgh RDM Training: MANTRA & beyond
University of Edinburgh RDM Training: MANTRA & beyond
Robin Rice
 
Overcoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjectsOvercoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjects
Robin Rice
 
‘Good, better, best’? Examining the range and rationales of institutional dat...
‘Good, better, best’? Examining the range and rationales of institutional dat...‘Good, better, best’? Examining the range and rationales of institutional dat...
‘Good, better, best’? Examining the range and rationales of institutional dat...
Robin Rice
 
Data Library Services at the University of Edinburgh
Data Library Services at the University of EdinburghData Library Services at the University of Edinburgh
Data Library Services at the University of Edinburgh
Robin Rice
 
Guiding users through data deposit
Guiding users through data depositGuiding users through data deposit
Guiding users through data deposit
Robin Rice
 
What does Open Science, Open Scholarship look like?
What does Open Science, Open Scholarship look like?What does Open Science, Open Scholarship look like?
What does Open Science, Open Scholarship look like?
Robin Rice
 

More from Robin Rice (20)

Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to data
 
Research Data Support at the University of Edinburgh
Research Data Support at the University of EdinburghResearch Data Support at the University of Edinburgh
Research Data Support at the University of Edinburgh
 
Research Data Service at the University of Edinburgh
Research Data Service at the University of EdinburghResearch Data Service at the University of Edinburgh
Research Data Service at the University of Edinburgh
 
Research data support: a growth area for academic libraries?
Research data support: a growth area for academic libraries?Research data support: a growth area for academic libraries?
Research data support: a growth area for academic libraries?
 
Staffing Research Data Services at University of Edinburgh
Staffing Research Data Services at University of EdinburghStaffing Research Data Services at University of Edinburgh
Staffing Research Data Services at University of Edinburgh
 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governance
 
The University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service SuiteThe University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service Suite
 
RDM Roadmap to the Future, or: Lords and Ladies of the Data
RDM Roadmap to the Future, or: Lords and Ladies of the DataRDM Roadmap to the Future, or: Lords and Ladies of the Data
RDM Roadmap to the Future, or: Lords and Ladies of the Data
 
Policies, procedures and standards for managing content in repositories.
Policies, procedures and standards for managing content in repositories.Policies, procedures and standards for managing content in repositories.
Policies, procedures and standards for managing content in repositories.
 
Providing research data services in changing times
Providing research data services in changing timesProviding research data services in changing times
Providing research data services in changing times
 
The University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service SuiteThe University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service Suite
 
Supporting researchers in managing data
Supporting researchers in managing dataSupporting researchers in managing data
Supporting researchers in managing data
 
Managing active research in the University of Edinburgh
Managing active research in the University of EdinburghManaging active research in the University of Edinburgh
Managing active research in the University of Edinburgh
 
Designing and delivering an international MOOC on Research Data Management an...
Designing and delivering an international MOOC on Research Data Management an...Designing and delivering an international MOOC on Research Data Management an...
Designing and delivering an international MOOC on Research Data Management an...
 
University of Edinburgh RDM Training: MANTRA & beyond
University of Edinburgh RDM Training: MANTRA & beyondUniversity of Edinburgh RDM Training: MANTRA & beyond
University of Edinburgh RDM Training: MANTRA & beyond
 
Overcoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjectsOvercoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjects
 
‘Good, better, best’? Examining the range and rationales of institutional dat...
‘Good, better, best’? Examining the range and rationales of institutional dat...‘Good, better, best’? Examining the range and rationales of institutional dat...
‘Good, better, best’? Examining the range and rationales of institutional dat...
 
Data Library Services at the University of Edinburgh
Data Library Services at the University of EdinburghData Library Services at the University of Edinburgh
Data Library Services at the University of Edinburgh
 
Guiding users through data deposit
Guiding users through data depositGuiding users through data deposit
Guiding users through data deposit
 
What does Open Science, Open Scholarship look like?
What does Open Science, Open Scholarship look like?What does Open Science, Open Scholarship look like?
What does Open Science, Open Scholarship look like?
 

Recently uploaded

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

Librarian RDM Training: Ethics and copyright for research data

  • 1. Librarian RDM Training Week 4: Ethics and copyright Robin Rice, Data Librarian Information Services Edinburgh: 5 December, 2012
  • 2. Learning objectives • Be aware of ethical requirements that apply to the collection and management of data involving human subjects. • Understand the difference between privacy and confidentiality and how they apply to the management of research data. • Know what IPR is and how it applies to your [users‟] research data.
  • 3. Ethics of collecting data on human subjects • The purpose and nature of the research itself • The nature of consent obtained (e.g. opt-in versus opt-out participation) • What data needs to be safeguarded during analysis and destroyed after its use
  • 4. Which research is subject to ethical review? • Using human participants or live animals • Referencing individual subjects (people) • Keeping identifiers for individuals
  • 5. EXEMPT from ethics review • freely available in the public domain, or • obtained through pure observational studies of public behaviour: – are of human action that occurs in a forum open to the general public – are non-invasive – require no interaction with participants – do not identify participants
  • 6. Some scholarly societies with ethics guidelines • Association of Social Anthropologists of the UK and the Commonwealth • British Association of Social Workers • British Psychological Society • British Educational Research Association • British Society of Criminology • British Sociological Association • Social Research Association
  • 7. Privacy and research • Individuals are normally considered to have a „right to privacy‟ - the state of being free from intrusion or disturbance in one's private life or affairs. • Research proposals need to indicate how data will be collected about human subjects. Ethical reviews will consider how intrusive this is for the subjects. • The right to privacy implies the need to obtain consent from research subjects.
  • 8. Confidentiality and research • Oftentimes the consent form will include a promise to the subject that the researcher will not disclose confidential information. • Keeping this agreement implies controls on storage, handling, and sharing of personal data. • Strategies can include – If possible, collect the necessary data without using personally identifying information. – If personally identifying information is required, de-identify your data upon collection or as soon as possible thereafter. – Avoid transmitting unencrypted personal data electronically.
  • 9. Intellectual Property Rights • Intellectual Property Rights (IPR) can be defined as rights acquired over any work created or invented with the intellectual effort of an individual. These rights are time-limited and do not require explicit assertion. • Owners of works are granted exclusive rights – to publish the work – to license the work‟s distribution to others – to sue in case of unlawful or deceptive copying • It may be possible to waive these rights through a public declaration similar to a licence.
  • 10. When do data enjoy copyright in the UK? • When the dataset is an expressive work – Even if not, the metadata may enjoy copyright • What if the data are merely a set of facts? – A simple list or spreadsheet might not enjoy copyright – The EU established a „database right‟ („sui generis‟ right) to protect substantial investment made by database producers in obtaining, verifying and presenting database contents. – Also, the structure of the database, including the selection and arrangement of the database‟s contents may meet a test of intellectual creativity bestowing copyright.
  • 11. Better not count on it though… • What does “in the public domain” mean? Not everyone on the internet understands copyright is implicit. • “Insubstantial amounts” of databases may be copied, but there is not a lot of case law to determine how much that is: under 50%? • “Screen scraping” is a common method of obtaining raw data from online sources. This may be lawful, depending on what gets published.
  • 12. To be continued… • Data licensing to be covered in next session • An advantage of data licensing is ability to be explicit about what can and cannot be done with the data obtained, compared with copyright. • However, if a licence is breached, any third party who obtains the data is not under its obligation! • A time-limited embargo in a repository may help data creators to gain time to publish results first.
  • 13. Last word • Best to create a public use dataset that you are comfortable about getting used, if putting online. • And don‟t forget the Freedom of Information Act and related legislation may compel you to release data, especially if in the public interest!