TrustArc Webinar: Challenges & Risks Of Data GraveyardsTrustArc
With the rise of big data, companies now obtain and store many data in massive quantities. As a result, they end up having giant repositories of unused data stored in their servers, also called data graveyards.
Storage infrastructure, maintenance costs, compliance with privacy laws, security gaps, and risk of data corruption: risks due to data graveyards are numerous.
What can organizations do with a large amount of data? How can you uncover the value of data before storing it? How can you manage the maintenance costs of big data?
Join our panel in this webinar as we explore how your company should manage the risks and challenges associated with data graveyards.
This webinar will review:
- What data graveyards are
- How to manage data graveyards risks
- How to define data retention periods and stay compliant
Research Data Management at the University of SalfordDavid Clay
The document summarizes the University of Salford's research data management project. It describes the drivers for the project including funder policies requiring open data. It outlines the requirements gathering and policy development process. It then details the proposed solution architecture including online storage, a data repository, source code management, and support services. Finally it discusses the pilot infrastructure launched in 2015 using Figshare and describes next steps to evaluate scaling up the RDM service.
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedRob Daley
This document provides an overview of best practices for managing research data. It discusses why data management is important given changing policies from funders that require making data openly available. It outlines challenges for researchers in managing data and provides guidance on developing a data management plan to address issues like data types, access, storage, and long-term preservation. The document also covers topics like formatting data, addressing legal and ethical concerns, publishing and citing data, and tools like ORCID and DOIs to help maximize the impact of research data.
This document discusses legal and ethical issues related to data sharing. It covers rights and copyright regarding data, how to address ethics when sharing personal data under GDPR, and obtaining consent from participants. Guidelines are provided for discovering and accessing shared data from repositories. Questions about data sharing are welcomed.
Data Protection Forum meetup 23052017 John M Walsh
The document discusses technologies that can help companies comply with the General Data Protection Regulation (GDPR). It describes tools from various vendors like SAP, Microsoft, IBM, Talend, and Informatica that can assist with data protection impact assessments, data governance, subject rights management, data masking, incident response, and compliance reporting. The presentation encourages attendees to contact the speaker if they have any other questions.
Research data management involves organizing data throughout the research lifecycle to ensure reliable verification of results and allow new research. It includes developing policies, storing and organizing data appropriately, and addressing requirements for working with personal or sensitive information. The Open University provides support and resources to help researchers effectively manage their data, including training, data storage options, and a research data repository.
An overview of the LSHTM Research Data Management Policy, outlining the motivations for its introduction, obligations that need to be met and the support available
Writing successful Data Management Plansdancrane_open
The document discusses writing successful data management plans (DMPs). It explains that a DMP is a project document that describes how data will be collected, stored, backed up, archived, and accessed. It provides guidance on what to include in a DMP, such as data collection methods, documentation, ethics, storage, sharing, and responsibilities. It recommends consulting advice and using online tools like DMP Online to help write funder-compliant DMPs.
TrustArc Webinar: Challenges & Risks Of Data GraveyardsTrustArc
With the rise of big data, companies now obtain and store many data in massive quantities. As a result, they end up having giant repositories of unused data stored in their servers, also called data graveyards.
Storage infrastructure, maintenance costs, compliance with privacy laws, security gaps, and risk of data corruption: risks due to data graveyards are numerous.
What can organizations do with a large amount of data? How can you uncover the value of data before storing it? How can you manage the maintenance costs of big data?
Join our panel in this webinar as we explore how your company should manage the risks and challenges associated with data graveyards.
This webinar will review:
- What data graveyards are
- How to manage data graveyards risks
- How to define data retention periods and stay compliant
Research Data Management at the University of SalfordDavid Clay
The document summarizes the University of Salford's research data management project. It describes the drivers for the project including funder policies requiring open data. It outlines the requirements gathering and policy development process. It then details the proposed solution architecture including online storage, a data repository, source code management, and support services. Finally it discusses the pilot infrastructure launched in 2015 using Figshare and describes next steps to evaluate scaling up the RDM service.
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedRob Daley
This document provides an overview of best practices for managing research data. It discusses why data management is important given changing policies from funders that require making data openly available. It outlines challenges for researchers in managing data and provides guidance on developing a data management plan to address issues like data types, access, storage, and long-term preservation. The document also covers topics like formatting data, addressing legal and ethical concerns, publishing and citing data, and tools like ORCID and DOIs to help maximize the impact of research data.
This document discusses legal and ethical issues related to data sharing. It covers rights and copyright regarding data, how to address ethics when sharing personal data under GDPR, and obtaining consent from participants. Guidelines are provided for discovering and accessing shared data from repositories. Questions about data sharing are welcomed.
Data Protection Forum meetup 23052017 John M Walsh
The document discusses technologies that can help companies comply with the General Data Protection Regulation (GDPR). It describes tools from various vendors like SAP, Microsoft, IBM, Talend, and Informatica that can assist with data protection impact assessments, data governance, subject rights management, data masking, incident response, and compliance reporting. The presentation encourages attendees to contact the speaker if they have any other questions.
Research data management involves organizing data throughout the research lifecycle to ensure reliable verification of results and allow new research. It includes developing policies, storing and organizing data appropriately, and addressing requirements for working with personal or sensitive information. The Open University provides support and resources to help researchers effectively manage their data, including training, data storage options, and a research data repository.
An overview of the LSHTM Research Data Management Policy, outlining the motivations for its introduction, obligations that need to be met and the support available
Writing successful Data Management Plansdancrane_open
The document discusses writing successful data management plans (DMPs). It explains that a DMP is a project document that describes how data will be collected, stored, backed up, archived, and accessed. It provides guidance on what to include in a DMP, such as data collection methods, documentation, ethics, storage, sharing, and responsibilities. It recommends consulting advice and using online tools like DMP Online to help write funder-compliant DMPs.
Data challenges are halting AI projects for multiple reasons, and open source developers are looking for solutions. Do you know how to share data sets properly? Just like software, you don't want to put your data sets out in the public domain without proper license protections. The Community Data License Agreement (CDLA) is a key part of the answer.
About 80% of the work with an AI project is collecting and preparing data. Are you having challenges with 'data sprawl' across your company? How about GDPR compliance? An open metadata strategy can help. Open source project Egeria provides the open metadata and governance type system, frameworks, APIs, event payloads and interchange protocols to enable tools, engines and platforms to exchange metadata. Leading project community members bring experience from their roles at HortonWorks, IBM, Index Analytics, ING, SAS, and others.
The document discusses the legal status of research data in terms of copyright and database rights. It defines research data and outlines when copyright or database rights may apply. If copyright applies, consent is needed to publish or share the data. For database rights to apply, the data needs to be systematically organized and substantial investment made in collecting and presenting it. Consent is generally not required for personal use of research data or using portions for scientific research without publication.
Increasing research impact: the national data registry - Alex Ball - Jisc Dig...Jisc
Evidence shows that all forms of research output have a role in increasing the impact and value of research. Data is particularly valuable, which is why research funders are placing so much emphasis on its retention, management and discoverability. However, few universities have data collections large enough to make their data globally visible, and few have the resources to connect data held locally with data in international data centres.
Jisc’s data registry service plans to cost-effectively solve this problem for universities, whilst also providing feedback for them and their researchers on how to increase the impact of their research data. This session will explain the goals and approach of the pilot, relate it to lessons from other countries and in government open data, and explain how Jisc and the community can work together to drive future developments in data discovery.
Research Data Management Introduction: EUDAT/Open AIRE Webinar| www.eudat.eu | EUDAT
This webinar discusses research data management. It explains why managing data is important for reproducibility, avoiding data loss, and meeting funder requirements. It outlines Horizon 2020's requirements for open data and describes services from EUDAT and OpenAIRE that can help with the entire data lifecycle from creation to long-term preservation and sharing. The webinar covers best practices like creating data management plans, metadata, using standards, licensing, and selecting repositories to archive and share research data.
Sabrina Kirrane works at Vienna University of Economics & Business. She discusses digital rights management from several perspectives including privacy, sustainability, data licensing, and data protection. Standardization is needed for policy languages to express permissions and obligations, as well as vocabularies to enable interoperability between systems regarding transparent data processing and compliance with legal obligations like GDPR.
This document provides an overview of a webinar on digital curation and research data management for universities. The webinar covers an introduction to digital curation, the benefits and drivers for research data management, current initiatives in UK universities, and the role of libraries in supporting research data management. Libraries are increasingly involved in developing institutional policies, providing training, and advising researchers on writing data management plans and sharing data. The webinar highlights training opportunities for librarians to develop skills in research data management and digital curation.
EUDAT Research Data Management | www.eudat.eu | EUDAT
| www.eudat.eu | The presentation gives an introduction to Research Data Management, explaining why it is important to manage and share data.
November 2016
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
In 2016, the European Union (EU) approved its General Data Protection Regulation (GDPR) to protect European citizens’ data. As a regulation, the GDPR does not require the implementation of legislation, and will immediately become an applicable law as of the 25th of May, 2018.
What is GDPR exactly trying to accomplish? According to the official documents, the goal is the “protection of natural persons with regard to the processing of personal data and on the free movement of such data.”
In short, organizations that conduct business in the EU will need to be compliant with GDPR, and must come to terms with the huge fines that non-compliance can carry. Fines can be up to €20M or 4% of the annual turnover. For companies that experience breaches that result in the loss of personal data (such as Talk Talk, which lost 170,000 people’s data), the fines will be tremendous.
Join us for discussion about GDPR to learn more about:
The principles that organizations that use personal data need to adhere to
The consequences organizations can face if that do not adhere to this new regulation
How your organization can prepare for the future
Webinar delivered by the OU Library Research Support team on 21st March 2020. Covers essential tips for working with research data, including file storage, information security, file naming, metadata and working with participants.
Quick Introduction to the EU GDPR by Sami ZahranDr. Sami Zahran
This document introduces a GDPR remediation programme to help organizations achieve compliance with the new General Data Protection Regulation (GDPR) that takes effect in May 2018. It discusses the motivation for GDPR including updating outdated privacy laws for the digital age. The programme will assess key areas like individuals' rights, consent, data transfers, and accountability. It will be a corporate-wide change effort governed by control boards at the corporate and business unit levels. Project managers and teams will implement new procedures, processes, technologies, roles, and training needed by the fixed deadline.
Presentation slides from an NCVO webinar which took place on 18 October 2017.
Presentation by Gary Shipsey from Protecture, find out more about Protecture: https://www.protecture.org.uk/
View the webinar recording: https://youtu.be/D7wuDS4QZgQ
FAIR Data in Trustworthy Data Repositories Webinar - 12-13 December 2016| www...EUDAT
| www.eudat.eu | This webinar was co-organised by DANS, EUDAT and OpenAIRE and was held on 12th and 13th December 2016.
Everybody wants to play FAIR, but how do we put the principles into practice?
There is a growing demand for quality criteria for research datasets. In this webinar we will argue that the DSA (Data Seal of Approval for data repositories) and FAIR principles get as close as possible to giving quality criteria for research data. They do not do this by trying to make value judgements about the content of datasets, but rather by qualifying the fitness for data reuse in an impartial and measurable way. By bringing the ideas of the DSA and FAIR together, we will be able to offer an operationalization that can be implemented in any certified Trustworthy Digital Repository.
In 2014 the FAIR Guiding Principles (Findable, Accessible, Interoperable and Reusable) were formulated. The well-chosen FAIR acronym is highly attractive: it is one of these ideas that almost automatically get stuck in your mind once you have heard it. In a relatively short term, the FAIR data principles have been adopted by many stakeholder groups, including research funders.
The FAIR principles are remarkably similar to the underlying principles of DSA (2005): the data can be found on the Internet, are accessible (clear rights and licenses), in a usable format, reliable and are identified in a unique and persistent way so that they can be referred to. Essentially, the DSA presents quality criteria for digital repositories, whereas the FAIR principles target individual datasets.
In this webinar the two sets of principles will be discussed and compared and a tangible operationalization will be presented.
Research data management & planning: an introductionMaggie Neilson
This document provides an introduction to research data management (RDM). It defines RDM as the organization and stewardship of research data throughout a research project and beyond. Key components of RDM include data management plans, metadata, sharing and preservation, and ethical and legal obligations. The document discusses why RDM is important, outlines the goals of the Tri-Agency Statement on digital data management, and provides resources for writing data management plans, creating metadata, sharing data, and addressing privacy and ethics.
GDPR The New Data Protection Law coming into effect May 2018. What does it me...eHealth Forum
GDPR The New Data Protection Law coming into effect May 2018. What does it mean for hospitals?
Anthe Papageorgiou, Compliance Officer & Data Protection Officer at Henry Dunant Hospital Center
The document discusses eDiscovery best practices including litigation readiness, preservation obligations, cooperation with opposing counsel, and the importance of communication. It provides guidance on identifying relevant data sources, implementing litigation holds, conducting custodian interviews, and utilizing meet and confers to agree on discovery procedures. The document emphasizes that following best practices helps ensure ethical and competent representation while avoiding unnecessary costs and motion practice.
The document discusses preparing organizations for compliance with the EU General Data Protection Regulation (GDPR). It provides an overview of key GDPR requirements, such as obtaining consent for personal data use, implementing privacy by design, and responding to data breaches. The document recommends developing a GDPR action plan that includes conducting privacy impact assessments and audits. Overall, the summary emphasizes the need for organizations to understand how they use personal data and ensure they can meet GDPR requirements for data protection.
Eu gdpr technical workflow and productionalization neccessary w privacy ass...Steven Meister
GDPR = General Data Protection Regulations or GDPR = Get Demand Payment Ready when your hacked or audited.
A Realistic project plan for GDPR Compliance. Another reality is the 95% not ready and even the 5% that say they are, will not like what they see in this plan in the hopes of becoming GDPR compliant.
There is just not enough time or people to get it done in the next 8 months and even if you had
2 years. This is a harsh reality and without the use of software technology and strict yet flexible, repeatable methodologies, it just won’t happen. Look at this Project plan of what needs to be done, do the math, see the complexity of data movement and code and programs needed then give us a call.
Evolving international privacy regulations and cross border data transfer - g...Ulf Mattsson
We will discuss the Evolving International Privacy Regulations. Cross Border Data Transfer for GDPR under Schrems II is now ruled by an EU court that defined what is required. This ruling can be far reaching for many businesses.
Working with Research Data 17th October 2019IzzyChad
Slides from a webinar delivered by the Open University Library on 17th October. This webinar covered practical details of how to manage data during research projects, including data security, file naming strategies and working with participants.
Presentation by Dr Jeff Christiansen, Intersect. Presented at the ANDS/Intersect sharing health-y data: challenges and solutions II workshop on 26th October 2016
Open Data Institute Course - Open Data in a Day conducted by Registered ODI Trainer Ian Henshaw on October 14, 2015 in RTP, NC USA - Deck #2 to Open Data Licensing, Law and Best Practice
Data challenges are halting AI projects for multiple reasons, and open source developers are looking for solutions. Do you know how to share data sets properly? Just like software, you don't want to put your data sets out in the public domain without proper license protections. The Community Data License Agreement (CDLA) is a key part of the answer.
About 80% of the work with an AI project is collecting and preparing data. Are you having challenges with 'data sprawl' across your company? How about GDPR compliance? An open metadata strategy can help. Open source project Egeria provides the open metadata and governance type system, frameworks, APIs, event payloads and interchange protocols to enable tools, engines and platforms to exchange metadata. Leading project community members bring experience from their roles at HortonWorks, IBM, Index Analytics, ING, SAS, and others.
The document discusses the legal status of research data in terms of copyright and database rights. It defines research data and outlines when copyright or database rights may apply. If copyright applies, consent is needed to publish or share the data. For database rights to apply, the data needs to be systematically organized and substantial investment made in collecting and presenting it. Consent is generally not required for personal use of research data or using portions for scientific research without publication.
Increasing research impact: the national data registry - Alex Ball - Jisc Dig...Jisc
Evidence shows that all forms of research output have a role in increasing the impact and value of research. Data is particularly valuable, which is why research funders are placing so much emphasis on its retention, management and discoverability. However, few universities have data collections large enough to make their data globally visible, and few have the resources to connect data held locally with data in international data centres.
Jisc’s data registry service plans to cost-effectively solve this problem for universities, whilst also providing feedback for them and their researchers on how to increase the impact of their research data. This session will explain the goals and approach of the pilot, relate it to lessons from other countries and in government open data, and explain how Jisc and the community can work together to drive future developments in data discovery.
Research Data Management Introduction: EUDAT/Open AIRE Webinar| www.eudat.eu | EUDAT
This webinar discusses research data management. It explains why managing data is important for reproducibility, avoiding data loss, and meeting funder requirements. It outlines Horizon 2020's requirements for open data and describes services from EUDAT and OpenAIRE that can help with the entire data lifecycle from creation to long-term preservation and sharing. The webinar covers best practices like creating data management plans, metadata, using standards, licensing, and selecting repositories to archive and share research data.
Sabrina Kirrane works at Vienna University of Economics & Business. She discusses digital rights management from several perspectives including privacy, sustainability, data licensing, and data protection. Standardization is needed for policy languages to express permissions and obligations, as well as vocabularies to enable interoperability between systems regarding transparent data processing and compliance with legal obligations like GDPR.
This document provides an overview of a webinar on digital curation and research data management for universities. The webinar covers an introduction to digital curation, the benefits and drivers for research data management, current initiatives in UK universities, and the role of libraries in supporting research data management. Libraries are increasingly involved in developing institutional policies, providing training, and advising researchers on writing data management plans and sharing data. The webinar highlights training opportunities for librarians to develop skills in research data management and digital curation.
EUDAT Research Data Management | www.eudat.eu | EUDAT
| www.eudat.eu | The presentation gives an introduction to Research Data Management, explaining why it is important to manage and share data.
November 2016
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
In 2016, the European Union (EU) approved its General Data Protection Regulation (GDPR) to protect European citizens’ data. As a regulation, the GDPR does not require the implementation of legislation, and will immediately become an applicable law as of the 25th of May, 2018.
What is GDPR exactly trying to accomplish? According to the official documents, the goal is the “protection of natural persons with regard to the processing of personal data and on the free movement of such data.”
In short, organizations that conduct business in the EU will need to be compliant with GDPR, and must come to terms with the huge fines that non-compliance can carry. Fines can be up to €20M or 4% of the annual turnover. For companies that experience breaches that result in the loss of personal data (such as Talk Talk, which lost 170,000 people’s data), the fines will be tremendous.
Join us for discussion about GDPR to learn more about:
The principles that organizations that use personal data need to adhere to
The consequences organizations can face if that do not adhere to this new regulation
How your organization can prepare for the future
Webinar delivered by the OU Library Research Support team on 21st March 2020. Covers essential tips for working with research data, including file storage, information security, file naming, metadata and working with participants.
Quick Introduction to the EU GDPR by Sami ZahranDr. Sami Zahran
This document introduces a GDPR remediation programme to help organizations achieve compliance with the new General Data Protection Regulation (GDPR) that takes effect in May 2018. It discusses the motivation for GDPR including updating outdated privacy laws for the digital age. The programme will assess key areas like individuals' rights, consent, data transfers, and accountability. It will be a corporate-wide change effort governed by control boards at the corporate and business unit levels. Project managers and teams will implement new procedures, processes, technologies, roles, and training needed by the fixed deadline.
Presentation slides from an NCVO webinar which took place on 18 October 2017.
Presentation by Gary Shipsey from Protecture, find out more about Protecture: https://www.protecture.org.uk/
View the webinar recording: https://youtu.be/D7wuDS4QZgQ
FAIR Data in Trustworthy Data Repositories Webinar - 12-13 December 2016| www...EUDAT
| www.eudat.eu | This webinar was co-organised by DANS, EUDAT and OpenAIRE and was held on 12th and 13th December 2016.
Everybody wants to play FAIR, but how do we put the principles into practice?
There is a growing demand for quality criteria for research datasets. In this webinar we will argue that the DSA (Data Seal of Approval for data repositories) and FAIR principles get as close as possible to giving quality criteria for research data. They do not do this by trying to make value judgements about the content of datasets, but rather by qualifying the fitness for data reuse in an impartial and measurable way. By bringing the ideas of the DSA and FAIR together, we will be able to offer an operationalization that can be implemented in any certified Trustworthy Digital Repository.
In 2014 the FAIR Guiding Principles (Findable, Accessible, Interoperable and Reusable) were formulated. The well-chosen FAIR acronym is highly attractive: it is one of these ideas that almost automatically get stuck in your mind once you have heard it. In a relatively short term, the FAIR data principles have been adopted by many stakeholder groups, including research funders.
The FAIR principles are remarkably similar to the underlying principles of DSA (2005): the data can be found on the Internet, are accessible (clear rights and licenses), in a usable format, reliable and are identified in a unique and persistent way so that they can be referred to. Essentially, the DSA presents quality criteria for digital repositories, whereas the FAIR principles target individual datasets.
In this webinar the two sets of principles will be discussed and compared and a tangible operationalization will be presented.
Research data management & planning: an introductionMaggie Neilson
This document provides an introduction to research data management (RDM). It defines RDM as the organization and stewardship of research data throughout a research project and beyond. Key components of RDM include data management plans, metadata, sharing and preservation, and ethical and legal obligations. The document discusses why RDM is important, outlines the goals of the Tri-Agency Statement on digital data management, and provides resources for writing data management plans, creating metadata, sharing data, and addressing privacy and ethics.
GDPR The New Data Protection Law coming into effect May 2018. What does it me...eHealth Forum
GDPR The New Data Protection Law coming into effect May 2018. What does it mean for hospitals?
Anthe Papageorgiou, Compliance Officer & Data Protection Officer at Henry Dunant Hospital Center
The document discusses eDiscovery best practices including litigation readiness, preservation obligations, cooperation with opposing counsel, and the importance of communication. It provides guidance on identifying relevant data sources, implementing litigation holds, conducting custodian interviews, and utilizing meet and confers to agree on discovery procedures. The document emphasizes that following best practices helps ensure ethical and competent representation while avoiding unnecessary costs and motion practice.
The document discusses preparing organizations for compliance with the EU General Data Protection Regulation (GDPR). It provides an overview of key GDPR requirements, such as obtaining consent for personal data use, implementing privacy by design, and responding to data breaches. The document recommends developing a GDPR action plan that includes conducting privacy impact assessments and audits. Overall, the summary emphasizes the need for organizations to understand how they use personal data and ensure they can meet GDPR requirements for data protection.
Eu gdpr technical workflow and productionalization neccessary w privacy ass...Steven Meister
GDPR = General Data Protection Regulations or GDPR = Get Demand Payment Ready when your hacked or audited.
A Realistic project plan for GDPR Compliance. Another reality is the 95% not ready and even the 5% that say they are, will not like what they see in this plan in the hopes of becoming GDPR compliant.
There is just not enough time or people to get it done in the next 8 months and even if you had
2 years. This is a harsh reality and without the use of software technology and strict yet flexible, repeatable methodologies, it just won’t happen. Look at this Project plan of what needs to be done, do the math, see the complexity of data movement and code and programs needed then give us a call.
Evolving international privacy regulations and cross border data transfer - g...Ulf Mattsson
We will discuss the Evolving International Privacy Regulations. Cross Border Data Transfer for GDPR under Schrems II is now ruled by an EU court that defined what is required. This ruling can be far reaching for many businesses.
Working with Research Data 17th October 2019IzzyChad
Slides from a webinar delivered by the Open University Library on 17th October. This webinar covered practical details of how to manage data during research projects, including data security, file naming strategies and working with participants.
Presentation by Dr Jeff Christiansen, Intersect. Presented at the ANDS/Intersect sharing health-y data: challenges and solutions II workshop on 26th October 2016
Open Data Institute Course - Open Data in a Day conducted by Registered ODI Trainer Ian Henshaw on October 14, 2015 in RTP, NC USA - Deck #2 to Open Data Licensing, Law and Best Practice
This document discusses best practices for preparing and sharing research data. It emphasizes obtaining proper consent from participants, performing a risk analysis to avoid re-identification, and considering appropriate sharing methods such as data repositories. Sharing data benefits the research community by encouraging new collaborations and validation of results, but must be balanced with obligations to protect participants and intellectual property. The document provides guidance on topics like data licensing, anonymization, and the policies of research institutions and journals regarding data sharing.
COnSeNT 2021 - ODRL Profile for Expressing Consent through Granular Access Co...Beatriz Esteves
Solid, the emerging technology for organizing data in decentralized stores, relies on a simple authorization mechanism for granting access to data. Solid’s personal online datastores (Pods) are ideal for keeping personal data, as they allow individuals to represent the access permissions in a very simple manner using Access Control Language (ACL) expressions. Whereas these expressions suffice for yes/no and read/write permissions, they cannot represent more complex rules nor invoke regulation-specific concepts. This paper describes an extension of the ACL language and algorithm to implement consent and data requests. The extension is based on the Open Digital Rights Language (ODRL) policy language, which allows expressing rich rules, and the Data Privacy Vocabulary (DPV), which permits invoking privacy and data protection-specific terms. Some usage examples illustrate this proposal.
Tasmania: Licensing data for sharing and reuseARDC
This document discusses data licensing and provides guidance on applying licenses to research data. It covers what a license is, why they are important for enabling reuse and collaboration, and recommends using licenses from the AusGOAL framework. The document explains that without a license, others cannot legally reuse or share the data. It provides examples of licensing different types of data and notes special considerations for sensitive health data. Guidance is given on how to physically apply a license and ensure proper attribution.
Data Sharing Principles and Legal Interoperability for Essential Biodiversity...agosti
The document discusses principles of open data sharing and legal interoperability of research data. It provides summaries of the GEO Data Sharing Principles from 2005 and a proposed updated version from 2015. The principles advocate sharing data as open data by default without charge or reuse restrictions. Exceptions can be made for reasons of national security, endangered species protection, or other restrictions allowed by law. The document also summarizes proposed principles from RDA/CODATA on facilitating lawful access to research data while balancing various legal interests through transparent communication of rights.
workshop session delivered alongside 'Making your thesis legal' workshop in July and September 2013 to PhD, MPhil, DrPh students who are completing their thesis. Discusses standards for sharing data, issues that need addressing, formats, data protection, usability, licenses
1) A data licence sets out how data can be reused and attributed. It is recommended that all data intended for reuse have a licence, whether open or restrictive, to promote safe and proper reuse.
2) The Creative Commons suite of licences are commonly used with 6 options ranging from most open to most restrictive. The CC BY licence allows for reuse and redistribution with attribution.
3) Applying a clear licence to data promotes safe data sharing and prevents unintended misuse by clarifying how others can access and use the data.
Overview of Emerging Requirements for Data Management of Federally Funded Res...Richard Huffine
The document discusses emerging requirements for federally funded research to share data. A presidential directive from 2013 requires that taxpayer-funded research data be made available to the public. Several agencies are required to develop plans to implement open data policies. Researchers may need to create data management plans and share data in public repositories under licenses that provide access while protecting rights. Requirements vary between agencies and managing shared data requirements may impact researchers.
This is a presentation delivered on December 1, 2020 by the UC Berkeley Library's Office of Scholarly Communication Services and the Research Data Management Program.
Are you unsure about how you can use or reuse other people’s data in your teaching or research, and what the terms and conditions are? Do you want to share your data with other researchers or license it for reuse but are wondering how and if that’s allowed? Do you have questions about university or granting agency data ownership and sharing policies, rights, and obligations? We will provide clear guidance on all of these questions and more in this interactive webinar on the ins-and-outs of data sharing and publishing.
- Explore venues and platforms for sharing and publishing data
- Unpack the terms of contracts and licenses affecting data reuse, sharing, and publishing
- Help you understand how copyright does (and does not) affect what you can do with the data you create or wish to use from other people
- Consider how to license your data for maximum downstream impact and reuse
- Demystify data ownership and publishing rights and obligations under university and grant policies
The document summarizes the DALICC (Data Licenses Clearance Center) project. The project aims to develop a software framework that reduces the costs of clearing licenses for derivative works by providing tools to choose licenses, check compatibility, and resolve conflicts. It will represent licenses in RDF and use rules and semantics to reason about licenses and detect inconsistencies. The framework will include components for composing, annotating, and negotiating licenses through a license library and API. The goal is to increase productivity and reuse of data by easing license clearance.
Presented to students and faculty at Michigan State University as a guest lecturer on private blockchains being used in government and industry for Management 491.
1. A public domain license allows the widest reuse of metadata as others can copy, correct, enhance, and augment the metadata without restrictions.
2. Under this scenario, Catalogue A initially publishes metadata for several datasets under a public domain license.
3. Then Catalogues B and C are able to reuse and enhance the metadata from Catalogue A, adding additional metadata and identifiers. Over time the metadata is improved through this collaborative process.
20191010_Research data licensing project : activities in RDUF subcommitteeYasuyuki Minamiyama
This document summarizes the activities of the Research Data Usage and Licensing Framework (RDUF) Subcommittee regarding research data licensing. It discusses:
1. Past activities including literature reviews, interviews, and a questionnaire to understand data licensing practices. A draft guideline for licensing research data was created.
2. Current activities focus on expanding the guideline scope to include data publishing and licenses. Supplemental materials like a glossary are being created.
3. Future plans involve testing the guideline at universities, gathering feedback, and publishing a recommendation from RDUF on research data licensing.
This is a presentation given to final year doctoral students at the London School of Hygiene & Tropical Medicine. It covers issues pertaining to copyright and open access publishing that students need to consider before submitting their thesis, as well as information on research data management and the actual process of submission.
Presentation slides on Open Science and research reproducibility. Presented by Gareth Knight (LSHTM Research Data Manager) on 18th September 2018, as part of an Open Science event for LSHTM Week 2018.
Laurence Horton of the London School of Economics gave a talk on the information security implications of the General Data Protection Regulation (GDPR). Presented at the London Area Research Data meeting on 17th November 2017, held at the London School of Hygiene & Tropical Medicine.
An introduction to the General Data Protection Regulation (GDPR) and its implications for research data management. Presentation given by Tim Rodgers of Imperial College London at the London Area Research Data meeting, held at the London School of Hygiene & Tropical Medicine on 17th Nov 2017.
Report on key findings of a Wellcome-commissioned study to investigate current practices for paper, data & code sharing among Wellcome & ESRC funded researchers and any barriers that are encountered. Presented by Gareth Knight at a CPD25 Open Access workshop at the Foundling museum in London on 26 April 2017.
Presentation slides from a talk by Gareth Knight which discussed the need to consider data sharing activities in academic citizenship, different approaches that may be taken to publish data associated with publications, and the opportunities presented by data journals
Presentation by Chris Grundy of LSHTM which describes his use of satellite images for population estimation and surveys, as well as mapping work performed by the online mapping community and NGOs to improve crowd sourced mapping data.
Ketevan is a Research Fellow in the Department of Health Services Research and Policy at LSHTM. She currently works on SPOTLIGHT, a cross-European research project for sustainable prevention of obesity through integrated strategies, where she is managing a large-scale survey conducted in England to assess the perceptions of environmental obesogenicity in selected neighbourhoods. She also assessed the built environment in those neighbourhoods using remote imaging using Google Street View.
An overview of the i-Sense platform, developed by UCL to monitor the spread of infectious disease. Presented by Jens Geyti of University College London at LSHTM's 'Enhancing data capture in health research' RDM event on November 20th, 2015.
Case study on the FluSurvey platform, developed by the London School of Hygiene & Tropical Medicine. Presented by Dr Sebastian Funk at LSHTM's 'Enhancing data capture in health research' RDM event on November 20th, 2015.
Case study on the development of the MyHeart Counts app built using Apple’s ResearchKit platform and future plans for Android development. Presented by Dr Dario Salvi of University of Oxford at LSHTM's 'Enhancing data capture in health research' RDM event on November 20th, 2015.
Case study on the use of electronic data collection in a modular household survey as part of the IDEAS project. Presented by Keith Tomlin at LSHTM's 'Enhancing data capture in health research' RDM event on November 20th, 2015.
Case study on mobile-based experience sampling using the Q-Sense and EmotionSense platform. Presented by Dr. Neal Lathia of Cambridge University at LSHTM's 'Enhancing data capture in health research' RDM event on November 20th, 2015.
An introduction to the FAIR principles and a discussion of key issues that must be addressed to ensure data is findable, accessible, interoperable and re-usable. The session explored the role of the CDISC and DDI standards for addressing these issues.
Presented by Gareth Knight at the ADMIT Network conference, organised by the Association for Data Management in the Tropics, in Antwerp, Belgium on December 1st 2015.
Presentation by Angus Whyte of the Digital Curation Centre. It was presented at the LSHTM Research Data Services workshop on June 30th 2015, an event organised to mark the end of LSHTM's Wellcome Trust funded RDM project. Updated version added on 14th August to clarify graph labels.
Presentation by Sally Rumsey of the University of Oxford. It was presented at the LSHTM Research Data Services workshop on June 30th 2015, an event organised to mark the end of LSHTM's Wellcome Trust funded RDM project.
The University of Edinburgh has over 33,000 students and 9,000 staff across three colleges covering a broad range of research disciplines. 83% of the University's research is rated as world-leading or internationally excellent. The University has prioritized data science and launched Edinburgh Data Science in 2014. It provides core research data management infrastructure to support good research practices. This includes training, policies, online data management planning tools, storage infrastructure, and repositories for active data use and long-term archiving. Challenges include promoting cultural change and integrating multiple research data services as needs evolve rapidly.
Presentation by Jeremy Barraud & Jess Crilly of University of the Arts London. It was presented at the LSHTM Research Data Services workshop on June 30th 2015, an event organised to mark the end of LSHTM's Wellcome Trust funded RDM project.
More from London School of Hygiene and Tropical Medicine (20)
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
1. INTRODUCTION TO
DATA LICENCES
Text is licensed under a Creative
Commons Attribution 4.0 International
License. Other licences apply to
images (see slide 19)
Gareth Knight
gareth.knight@lshtm.ac.uk
26th May 2015
Disclaimer:
I am Not a Lawyer. This is not legal advice
2. Overview
• Reasons to apply a data licence
• Database rights
• Expectations for data licences (LSHTM, funder, journal)
• Licensing your research data (CC, ODC, DTAs)
• Working with 3rd party data
• Conclusion
3. Data Licence
• Data licence motivated by need to
share data
• Establish conditions under which
data may be accessed, used & cited
• Many rights apply to data
– Copyright
– Moral
– Database
• Rights issues vary between countries
• Ensure that your project has clarified
rights issues before sharing
4. Database Rights
• Does not require 'creative' aspect
defined by copyright to be protected
• ‘Copyright and Rights in Databases
Regulations’ 1997 applies it to:
– DBs created after 27 March 1996
– Created by EEA nationals, EEA
residents & businesses with central
operations in EEA
• Last for 15 years from completion or
publication (whichever is longest)
• Any substantial update causes the 15
year period to begin anew
Recognise investment made into compilation of database
5. LSHTM Expectations
• Rights information should be:
– Clear and unambiguous
– Documented at an appropriate level of
granularity
• Recommend a non-exclusive licence
that allows many people to access and
use data
• Should not assign exclusive rights to 3rd
party, unless it is a condition imposed
by contractual or other obligations.
“Rights assigned to research data should not unnecessarily
restrict its management, sharing, or use”
RDM Policy, Principle 2
LSHTM RDM Policy
http://www.lshtm.ac.uk/research/researchdataman/rdm_policy.html#principle02
LSHTM RDM Policy
http://www.lshtm.ac.uk/research/researchdataman/rdm_policy.html#principle02
6. • Many state data should be:
"made openly available and accessible with
as few restrictions as possible"
• Encourage FAIR principles - Findable,
Accessible, Interoperable & Re-usable
• Expect consortium agreements to enable
data sharing
• However, recognise legal, ethical &
commercial constraints may limit access
and use
• Encourage licences that encourage uptake
in some form (Open, controlled,
commercial)
Funder Expectations
7. Journal Expectations
• Growing number of journals that:
– Specialise in open data
– Expect data to be made available
• Expect openness by default, unless
good reason can be provided
– Creative Commons Attribution
(CC-BY)
– Anonymous download from a
public repository
• Recognise open sharing not always
feasible for health data
– Controlled access
– Data sharing agreements
8. Licensing your research data
1. Identify rights holders
– LSHTM
– Collaborators
– Participants
– Data providers & others
2. Determine terms to be applied
– Policy, Consortium agreement,
consent forms
3. Review licence models
– Creative, Commons
– Open Government Licence
– Data Transfer Agreement
4. Select appropriate licence
9. Creative Commons
ATTRIBUTION
NON-COMMERCIAL
NO DERIVATIVES
SHARE ALIKE
+ : Permits open reuse
- : ‘Attribute stacking’ – distant authors
- : Unable to control how data is used
+ : Permits academic & other NC use
- : Cannot be used by commercial
collaborators
+ : Allows analysis
- : No cleaned, remixed, or other
derivatives allowed
+ : Prevents future users re-licensing
derivatives under a restrictive licence
- : Difficult to combine with other licences
10. Open Data Commons
Share data
Create works
Adapt & modify
ODC Open Database License (ODbL)
http://opendatacommons.org/licenses/odbl/
Attribution, Share alike & keep open
ODC Attribution
http://opendatacommons.org/licenses/by/
Attribution
ODC Public Domain Dedication
http://opendatacommons.org/licenses/pddl/summary/
None
11. Data Transfer Agreement
Tailored licence form that defines
conditions such as:
• Use for specific purpose
• Handling of participant information
(no attempt to re-identify)
• Storage in secure environment
• Retention period (e.g. 1 yr)
• Administration charges
Signed agreement that specifies storage & use conditions
Contact the Knowledge Transfer Manager (deborah.carter@lshtm.ac.uk) for guidanceContact the Knowledge Transfer Manager (deborah.carter@lshtm.ac.uk) for guidance
12. Working with 3rd party data
Myth:
• Data has no licence: It can be analysed for any purpose
• Data is free to download: It can be re-published in any form
Review dataset description for licence information:
1. What purposes are you allowed to use data for?
2. Are there any expectations?
– e.g. citation, costs
3. Are there any limitations?
• If there's no licence, contact the creator/publisher.
Large amount of data available, but can you use it?
13. Dealing with multiple datasets
Potential for licence conflict when
working with multiple datasets
Licence compatibility definitions:
• Exact match: Both licences use terms
that have the same purpose, meaning
and effect
• One-way: Data made available under a
permissive license can be combined with
data that has a more restrictive licence
Does source licence allow mashups to be shared?
http://creativecommons.org/compatiblelicenses
http://opendefinition.org/licenses/
http://opensource.com/law/11/9/mpl-20-copyleft-and-license-compatibility
14. Creative Commons:
No Derivatives
Instructions needed to explains how dataset
may be merged for validation purposes
Based upon scenarios by Leigh Dodds "Oil and Water: When Data Licences Don't Mix“
http://www.slideshare.net/ldodds/oil-and-water-when-data-licences-dont-mix
15. Creative Commons:
Share alike Conflict
Each update can be published separately & instructions
provided on how to merge for validation
Based upon scenarios by Leigh Dodds "Oil and Water: When Data Licences Don't Mix“
http://www.slideshare.net/ldodds/oil-and-water-when-data-licences-dont-mix
16. Creative Commons:
Mixing open licences
If licences are compatible, least open licence wins
Based upon scenarios by Leigh Dodds "Oil and Water: When Data Licences Don't Mix“
http://www.slideshare.net/ldodds/oil-and-water-when-data-licences-dont-mix
17. Conclusion
• Licence models are a key component of data sharing
• Researchers must consider data licences when
– Reusing existing data
– Creating own data
(particularly when there is a need make data available)
• Rights information should be clear, unambiguous and documented at
appropriate granularity
• Recommend use of a non-exclusive licence that allows many people
to access and use data
• Should not assign exclusive rights to 3rd party, unless it is a condition
imposed by contractual or other obligations.
18. Resources
• LSHTM. Choose a Data Licence
http://www.lshtm.ac.uk/research/researchdataman/share/choose_licence.html
• Digital Curation Centre: How to License Research Data
http://www.dcc.ac.uk/resources/how-guides/license-research-data
• Korn & Oppenheim (2011). Licensing Open Data: A Practical Guide
http://discovery.ac.uk/files/pdf/Licensing_Open_Data_A_Practical_Guide.pdf
• ODI. Publisher’s Guide to Open Data Licensing
https://theodi.org/guides/publishers-guide-open-data-licensing
19. Images
Slide 3: “That’s Right” by Kaytee Riek (CC BY-NC-SA 2.0)
https://www.flickr.com/photos/riekhavoc/4813140176/
Slide 4: “WordPress 2.7 Database Schema” by Rafael Poveda (CC BY-NC-SA 2.0)
https://www.flickr.com/photos/bioxid/3640432505/
Slide 8: “Reuse” by Steev Hise (CC BY-NC-SA 2.0)
https://www.flickr.com/photos/steev/39393264/
Slide 11: “Permit Holders Only A” by Gregory Wake (CC BY-NC-SA 2.0)
https://www.flickr.com/photos/gregwake/2301264039
Slide 12: “Sharing” by ryancr (CC BY-NC 2.0)
https://www.flickr.com/photos/ryanr/142455033/
Slide 13: “Death By…” by nataliej (CC BY-NC 2.0)
https://www.flickr.com/photos/nataliejohnson/2296566285/