SlideShare a Scribd company logo
Towards Privacy By Design
Key issues to unlock science.
Symposium: Designing and Shaping Open Science
Amsterdam, April 5 2016
Marlon Domingus
1. Attitude and Trust
2. The Researcher
3. Maturity Models as Time Machines
4. New Roles and Collaborations
5. Context and Framing
Key issues
Attitude
Source: https://cybersponse.com/data-breaches-by-the-numbers
Trust
Responsible Research and Innovation
Good Citizenship
Corporate Social Responsibility
Soft Law:
Code of
Conduct,
Guidelines,
...
Hard Law:
Privacy Law,
Patent Law,
…
Hard Law:
Contracts,
Agreements,
...
The researcher in context
European Code of Conduct
National Code of Conduct
University Policy
- Research Integrity
- Open Access, RDM
Discipline Specific
Code of Conduct
The researcher in context: soft law
European Funding Requirements
National Funding Requirements
University Requirements
The researcher in context: requirements
University A, Country A
T1: researcher works at University A, co-operates with University B and C
University B, Country A
collaboration University C, Country B
collaboration
The researcher (& infrastructure) in context
University A, Country A
University B, Country A
University C, Country Bcollaboration
collaboration
T2: researcher works at University B, co-operates with University C, D and E
T3: …
collaboration
The researcher (& infrastructure) in context
Researcher Mobility
Responsible Research and Innovation
Good Citizenship
Corporate Social Responsibility
Legal and Moral Requirements
Research Cycle
Transparency, Guidelines, Services, Infra, …
The researcher in context
Source: https://www.monash.edu/__data/assets/pdf_file/0010/385309/sensitive-decision-tree.pdf
Example
11
12
It took some time and effort,
but now we have Open Access and Open Science.
How did we get here?
2020 Hindsight
Legal Research Support Maturity Model
Level 1 Level 2 Level 3 Level 4 Level 5
Initial Development Defined Managed Optimised
Process is disorganised
& ad hoc
Process is under development Process is standardised,
communicated
Process is managed, measured Focus is on continuous
improvement
Institutional policies
& procedures
Policies & procedures may be
undeveloped, not up to date,
and/or inconsistent.
Policies & procedures are
developed & harmonised. Basic
understanding of the gaps in
the policies & guidelines.
Policies & procedures are
promulgated & absorbed into
behaviours.
Policies & procedures accepted as
part of the culture & subject to
audit.
Policies & procedures are
subject to review &
improvement.
Legal Research
Support
Legal support services are disorganised,
research contracts and agreements are
legally ad hoc supported, inconsistent and
poorly publicised.
Investment in legal expertise.
Legal services identified &
staffed. Responsibilities are
defined. Documentation &
awareness programs
developed.
Co-operation between legal
experts & widespread
availability of well documented
services. Common knowledge
available of all relevant legal
research support topics.
Widespread take up of legal
services at an early stage in the
research project. IPR and Privacy
are acknowledged as critical to
the institutional mission.
Researcher’s feedback,
research project’s lessons
learned as well as analysis of
awarded grant are used to
update & improve legal
research support services.
IT infrastructure IT infrastructure provision is patchy,
disorganised & poorly publicised &
not supporting the whole research cycle.
Funds are invested in
technology & skills.
Responsibilities are defined.
Processes are established,
defined & documented.
Awareness of the different IT
infra needs during the research
cycle.
Management shows active
support. Facilities are well
defined & communicated,
standardised & integrated. The
main aspects of the research
cycle are supported in the IT
infra. Key privacy aspects are
secured in the IT infra.
Infrastructure facilitates whole
research cycle as well as special
requests for Research IT infra.
Management actively engaged.
Documentation kept up to date.
Privacy By Design implemented.
Concerted efforts to maintain,
update & publicise
infrastructure. Metrics &
feedback used to optimise
services. Research IT staff
hired for tailored research
support.
Based on the ANDS RDM Framework: http://ands.org.au/guides/capability-maturity
14
example
Source: https://www.aicpa.org/InterestAreas/InformationTechnology/Resources/Privacy/GenerallyAcceptedPrivacyPrinciples/DownloadableDocuments/AICPA-
CICA-Privacy-Maturity-Model-ebook.pdf
15
Chief Information Security Officer
Data Protection Officer
Integrity Officer
Ethical Committee
…
New roles and collaborations
Context and Framing
Further Information
drs. Marlon Domingus
project manager
Research Data Management
Erasmus University Rotterdam
+31 10 4088006
domingus@ubib.eur.nl

More Related Content

What's hot

Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
Sagara Gunathunga
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
Kristyn Greenwood
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
bradley_g
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by design
Tommy Vandepitte
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
Abzetdin Adamov
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision Making
Abzetdin Adamov
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
kevintsmith
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Ontario Cloud SIG
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
Peter Procházka
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
Claudiu Popa
 
Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance Computing
Abzetdin Adamov
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
bradley_g
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
Giulio Coraggio
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
Marc Vael
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect stormUlf Mattsson
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Infosecurity2010
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of Things
PECB
 
Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Design
bradley_g
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
Marc Vael
 

What's hot (20)

Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by design
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision Making
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance Computing
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of Things
 
Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Design
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 

Viewers also liked

'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
IanHallUK
 
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"iMedia Connection
 
Data is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel AmsterdamData is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel Amsterdam
Aurélie Pols
 
Get data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design conceptGet data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design concept
Aurélie Pols
 
Privacy by Design
Privacy by DesignPrivacy by Design
Privacy by Design
Advokatfirmaet Haavind
 
Slides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraalSlides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraal
Kennisnet
 
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design
EIC 2014   Oasis Workshop: Using XACML to implement Privacy by DesignEIC 2014   Oasis Workshop: Using XACML to implement Privacy by Design
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design
David Brossard
 
Privacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxswPrivacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxswKennisnet
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016
Digia Plc
 

Viewers also liked (9)

'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
 
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
 
Data is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel AmsterdamData is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel Amsterdam
 
Get data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design conceptGet data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design concept
 
Privacy by Design
Privacy by DesignPrivacy by Design
Privacy by Design
 
Slides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraalSlides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraal
 
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design
EIC 2014   Oasis Workshop: Using XACML to implement Privacy by DesignEIC 2014   Oasis Workshop: Using XACML to implement Privacy by Design
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design
 
Privacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxswPrivacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxsw
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016
 

Similar to Towards Privacy by Design. Key issues to unlock science.

Finding the Law for Sharing Data in Academia
Finding the Law for Sharing Data in AcademiaFinding the Law for Sharing Data in Academia
Finding the Law for Sharing Data in Academia
Marlon Domingus
 
Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...
Marlon Domingus
 
LEARN Webinar
LEARN WebinarLEARN Webinar
LEARN Webinar
LEARN Project
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Glenn Villanueva
 
Open Science in Research Libraries: Research, Research Integrity and Legal As...
Open Science in Research Libraries: Research, Research Integrity and Legal As...Open Science in Research Libraries: Research, Research Integrity and Legal As...
Open Science in Research Libraries: Research, Research Integrity and Legal As...
Marlon Domingus
 
What are the Different Research Design / Ways That I can Approach My Law Dis...
What are the Different Research Design  / Ways That I can Approach My Law Dis...What are the Different Research Design  / Ways That I can Approach My Law Dis...
What are the Different Research Design / Ways That I can Approach My Law Dis...
PhD Assistance
 
Stewardship data-guidelines- research information network jan 2008
Stewardship data-guidelines- research information network jan 2008Stewardship data-guidelines- research information network jan 2008
Stewardship data-guidelines- research information network jan 2008
Eldad Sotnick-Yogev
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
blogzilla
 
Research ethics and problems encountred by reseachers
Research ethics and problems encountred by reseachers Research ethics and problems encountred by reseachers
Research ethics and problems encountred by reseachers
ErTARUNKASHNI
 
What are the Different Research Design / Ways That I can Approach My Law Dis...
What are the Different Research Design  / Ways That I can Approach My Law Dis...What are the Different Research Design  / Ways That I can Approach My Law Dis...
What are the Different Research Design / Ways That I can Approach My Law Dis...
PhD Assistance
 
African Open Science Platform: Pilot Phase
African Open Science Platform: Pilot PhaseAfrican Open Science Platform: Pilot Phase
African Open Science Platform: Pilot Phase
Academy of Science of South Africa (ASSAf)
 
ESRC Knowledge Brokerage conference: the third sector
ESRC Knowledge Brokerage conference: the third sectorESRC Knowledge Brokerage conference: the third sector
ESRC Knowledge Brokerage conference: the third sectorKarl Wilding
 
The value of engagement
The value of engagementThe value of engagement
The value of engagement
wellcome.trust
 
The wrong story: regulation, innovation and research in the future of legal e...
The wrong story:regulation, innovation and research in the future of legal e...The wrong story:regulation, innovation and research in the future of legal e...
The wrong story: regulation, innovation and research in the future of legal e...
The Higher Education Academy
 
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Project
 
Research Ethics -PPT.ppt
Research Ethics -PPT.pptResearch Ethics -PPT.ppt
Research Ethics -PPT.ppt
MeghanaShetty23
 
Research Process (PR1)
Research Process (PR1)Research Process (PR1)
Research Process (PR1)
MaryAngelaVillegas
 
Lesson 1 Nature of Inqury and Research - Copy.pptx
Lesson 1 Nature of Inqury and Research - Copy.pptxLesson 1 Nature of Inqury and Research - Copy.pptx
Lesson 1 Nature of Inqury and Research - Copy.pptx
DanicaAnnStaRosa2
 
Strategies to enhance research impact: Six lessons
Strategies to enhance research impact: Six lessonsStrategies to enhance research impact: Six lessons
Strategies to enhance research impact: Six lessons
ODI_Webmaster
 

Similar to Towards Privacy by Design. Key issues to unlock science. (20)

Finding the Law for Sharing Data in Academia
Finding the Law for Sharing Data in AcademiaFinding the Law for Sharing Data in Academia
Finding the Law for Sharing Data in Academia
 
Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...
 
LEARN Webinar
LEARN WebinarLEARN Webinar
LEARN Webinar
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
 
Open Science in Research Libraries: Research, Research Integrity and Legal As...
Open Science in Research Libraries: Research, Research Integrity and Legal As...Open Science in Research Libraries: Research, Research Integrity and Legal As...
Open Science in Research Libraries: Research, Research Integrity and Legal As...
 
What are the Different Research Design / Ways That I can Approach My Law Dis...
What are the Different Research Design  / Ways That I can Approach My Law Dis...What are the Different Research Design  / Ways That I can Approach My Law Dis...
What are the Different Research Design / Ways That I can Approach My Law Dis...
 
Stewardship data-guidelines- research information network jan 2008
Stewardship data-guidelines- research information network jan 2008Stewardship data-guidelines- research information network jan 2008
Stewardship data-guidelines- research information network jan 2008
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Research ethics and problems encountred by reseachers
Research ethics and problems encountred by reseachers Research ethics and problems encountred by reseachers
Research ethics and problems encountred by reseachers
 
What are the Different Research Design / Ways That I can Approach My Law Dis...
What are the Different Research Design  / Ways That I can Approach My Law Dis...What are the Different Research Design  / Ways That I can Approach My Law Dis...
What are the Different Research Design / Ways That I can Approach My Law Dis...
 
African Open Science Platform: Pilot Phase
African Open Science Platform: Pilot PhaseAfrican Open Science Platform: Pilot Phase
African Open Science Platform: Pilot Phase
 
ESRC Knowledge Brokerage conference: the third sector
ESRC Knowledge Brokerage conference: the third sectorESRC Knowledge Brokerage conference: the third sector
ESRC Knowledge Brokerage conference: the third sector
 
The value of engagement
The value of engagementThe value of engagement
The value of engagement
 
The wrong story: regulation, innovation and research in the future of legal e...
The wrong story:regulation, innovation and research in the future of legal e...The wrong story:regulation, innovation and research in the future of legal e...
The wrong story: regulation, innovation and research in the future of legal e...
 
Slideset for HEA Law Summit, Loughborough, January 2014
Slideset for HEA Law Summit, Loughborough, January 2014Slideset for HEA Law Summit, Loughborough, January 2014
Slideset for HEA Law Summit, Loughborough, January 2014
 
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
 
Research Ethics -PPT.ppt
Research Ethics -PPT.pptResearch Ethics -PPT.ppt
Research Ethics -PPT.ppt
 
Research Process (PR1)
Research Process (PR1)Research Process (PR1)
Research Process (PR1)
 
Lesson 1 Nature of Inqury and Research - Copy.pptx
Lesson 1 Nature of Inqury and Research - Copy.pptxLesson 1 Nature of Inqury and Research - Copy.pptx
Lesson 1 Nature of Inqury and Research - Copy.pptx
 
Strategies to enhance research impact: Six lessons
Strategies to enhance research impact: Six lessonsStrategies to enhance research impact: Six lessons
Strategies to enhance research impact: Six lessons
 

More from Marlon Domingus

Safeguarding privacy in research design
Safeguarding privacy in research designSafeguarding privacy in research design
Safeguarding privacy in research design
Marlon Domingus
 
An itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchAn itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and research
Marlon Domingus
 
The GDPR perspectives: Philosophy
The GDPR perspectives: PhilosophyThe GDPR perspectives: Philosophy
The GDPR perspectives: Philosophy
Marlon Domingus
 
Privacy and Data Protection in Research
Privacy and Data Protection in ResearchPrivacy and Data Protection in Research
Privacy and Data Protection in Research
Marlon Domingus
 
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoekVSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
Marlon Domingus
 
Research Support @ Erasmus University Rotterdam
Research Support @ Erasmus University RotterdamResearch Support @ Erasmus University Rotterdam
Research Support @ Erasmus University Rotterdam
Marlon Domingus
 
Masterclass Research Support
Masterclass Research SupportMasterclass Research Support
Masterclass Research Support
Marlon Domingus
 

More from Marlon Domingus (7)

Safeguarding privacy in research design
Safeguarding privacy in research designSafeguarding privacy in research design
Safeguarding privacy in research design
 
An itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchAn itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and research
 
The GDPR perspectives: Philosophy
The GDPR perspectives: PhilosophyThe GDPR perspectives: Philosophy
The GDPR perspectives: Philosophy
 
Privacy and Data Protection in Research
Privacy and Data Protection in ResearchPrivacy and Data Protection in Research
Privacy and Data Protection in Research
 
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoekVSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
 
Research Support @ Erasmus University Rotterdam
Research Support @ Erasmus University RotterdamResearch Support @ Erasmus University Rotterdam
Research Support @ Erasmus University Rotterdam
 
Masterclass Research Support
Masterclass Research SupportMasterclass Research Support
Masterclass Research Support
 

Recently uploaded

Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
Lokesh Patil
 
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
yqqaatn0
 
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptxThe use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
MAGOTI ERNEST
 
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Ana Luísa Pinho
 
Mudde & Rovira Kaltwasser. - Populism in Europe and the Americas - Threat Or...
Mudde &  Rovira Kaltwasser. - Populism in Europe and the Americas - Threat Or...Mudde &  Rovira Kaltwasser. - Populism in Europe and the Americas - Threat Or...
Mudde & Rovira Kaltwasser. - Populism in Europe and the Americas - Threat Or...
frank0071
 
Nucleophilic Addition of carbonyl compounds.pptx
Nucleophilic Addition of carbonyl  compounds.pptxNucleophilic Addition of carbonyl  compounds.pptx
Nucleophilic Addition of carbonyl compounds.pptx
SSR02
 
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdfTopic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
TinyAnderson
 
Introduction to Mean Field Theory(MFT).pptx
Introduction to Mean Field Theory(MFT).pptxIntroduction to Mean Field Theory(MFT).pptx
Introduction to Mean Field Theory(MFT).pptx
zeex60
 
Phenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvementPhenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvement
IshaGoswami9
 
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Sérgio Sacani
 
mô tả các thí nghiệm về đánh giá tác động dòng khí hóa sau đốt
mô tả các thí nghiệm về đánh giá tác động dòng khí hóa sau đốtmô tả các thí nghiệm về đánh giá tác động dòng khí hóa sau đốt
mô tả các thí nghiệm về đánh giá tác động dòng khí hóa sau đốt
HongcNguyn6
 
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
University of Maribor
 
THEMATIC APPERCEPTION TEST(TAT) cognitive abilities, creativity, and critic...
THEMATIC  APPERCEPTION  TEST(TAT) cognitive abilities, creativity, and critic...THEMATIC  APPERCEPTION  TEST(TAT) cognitive abilities, creativity, and critic...
THEMATIC APPERCEPTION TEST(TAT) cognitive abilities, creativity, and critic...
Abdul Wali Khan University Mardan,kP,Pakistan
 
Shallowest Oil Discovery of Turkiye.pptx
Shallowest Oil Discovery of Turkiye.pptxShallowest Oil Discovery of Turkiye.pptx
Shallowest Oil Discovery of Turkiye.pptx
Gokturk Mehmet Dilci
 
Oedema_types_causes_pathophysiology.pptx
Oedema_types_causes_pathophysiology.pptxOedema_types_causes_pathophysiology.pptx
Oedema_types_causes_pathophysiology.pptx
muralinath2
 
原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
yqqaatn0
 
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptxANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
RASHMI M G
 
Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
SAMIR PANDA
 
BREEDING METHODS FOR DISEASE RESISTANCE.pptx
BREEDING METHODS FOR DISEASE RESISTANCE.pptxBREEDING METHODS FOR DISEASE RESISTANCE.pptx
BREEDING METHODS FOR DISEASE RESISTANCE.pptx
RASHMI M G
 
ESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptxESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptx
PRIYANKA PATEL
 

Recently uploaded (20)

Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
 
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
 
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptxThe use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
 
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
 
Mudde & Rovira Kaltwasser. - Populism in Europe and the Americas - Threat Or...
Mudde &  Rovira Kaltwasser. - Populism in Europe and the Americas - Threat Or...Mudde &  Rovira Kaltwasser. - Populism in Europe and the Americas - Threat Or...
Mudde & Rovira Kaltwasser. - Populism in Europe and the Americas - Threat Or...
 
Nucleophilic Addition of carbonyl compounds.pptx
Nucleophilic Addition of carbonyl  compounds.pptxNucleophilic Addition of carbonyl  compounds.pptx
Nucleophilic Addition of carbonyl compounds.pptx
 
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdfTopic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
 
Introduction to Mean Field Theory(MFT).pptx
Introduction to Mean Field Theory(MFT).pptxIntroduction to Mean Field Theory(MFT).pptx
Introduction to Mean Field Theory(MFT).pptx
 
Phenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvementPhenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvement
 
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
 
mô tả các thí nghiệm về đánh giá tác động dòng khí hóa sau đốt
mô tả các thí nghiệm về đánh giá tác động dòng khí hóa sau đốtmô tả các thí nghiệm về đánh giá tác động dòng khí hóa sau đốt
mô tả các thí nghiệm về đánh giá tác động dòng khí hóa sau đốt
 
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
 
THEMATIC APPERCEPTION TEST(TAT) cognitive abilities, creativity, and critic...
THEMATIC  APPERCEPTION  TEST(TAT) cognitive abilities, creativity, and critic...THEMATIC  APPERCEPTION  TEST(TAT) cognitive abilities, creativity, and critic...
THEMATIC APPERCEPTION TEST(TAT) cognitive abilities, creativity, and critic...
 
Shallowest Oil Discovery of Turkiye.pptx
Shallowest Oil Discovery of Turkiye.pptxShallowest Oil Discovery of Turkiye.pptx
Shallowest Oil Discovery of Turkiye.pptx
 
Oedema_types_causes_pathophysiology.pptx
Oedema_types_causes_pathophysiology.pptxOedema_types_causes_pathophysiology.pptx
Oedema_types_causes_pathophysiology.pptx
 
原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
 
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptxANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
 
Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
 
BREEDING METHODS FOR DISEASE RESISTANCE.pptx
BREEDING METHODS FOR DISEASE RESISTANCE.pptxBREEDING METHODS FOR DISEASE RESISTANCE.pptx
BREEDING METHODS FOR DISEASE RESISTANCE.pptx
 
ESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptxESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptx
 

Towards Privacy by Design. Key issues to unlock science.

  • 1. Towards Privacy By Design Key issues to unlock science. Symposium: Designing and Shaping Open Science Amsterdam, April 5 2016 Marlon Domingus
  • 2. 1. Attitude and Trust 2. The Researcher 3. Maturity Models as Time Machines 4. New Roles and Collaborations 5. Context and Framing Key issues
  • 5. Responsible Research and Innovation Good Citizenship Corporate Social Responsibility Soft Law: Code of Conduct, Guidelines, ... Hard Law: Privacy Law, Patent Law, … Hard Law: Contracts, Agreements, ... The researcher in context
  • 6. European Code of Conduct National Code of Conduct University Policy - Research Integrity - Open Access, RDM Discipline Specific Code of Conduct The researcher in context: soft law
  • 7. European Funding Requirements National Funding Requirements University Requirements The researcher in context: requirements
  • 8. University A, Country A T1: researcher works at University A, co-operates with University B and C University B, Country A collaboration University C, Country B collaboration The researcher (& infrastructure) in context
  • 9. University A, Country A University B, Country A University C, Country Bcollaboration collaboration T2: researcher works at University B, co-operates with University C, D and E T3: … collaboration The researcher (& infrastructure) in context
  • 10. Researcher Mobility Responsible Research and Innovation Good Citizenship Corporate Social Responsibility Legal and Moral Requirements Research Cycle Transparency, Guidelines, Services, Infra, … The researcher in context
  • 12. 12
  • 13. It took some time and effort, but now we have Open Access and Open Science. How did we get here? 2020 Hindsight
  • 14. Legal Research Support Maturity Model Level 1 Level 2 Level 3 Level 4 Level 5 Initial Development Defined Managed Optimised Process is disorganised & ad hoc Process is under development Process is standardised, communicated Process is managed, measured Focus is on continuous improvement Institutional policies & procedures Policies & procedures may be undeveloped, not up to date, and/or inconsistent. Policies & procedures are developed & harmonised. Basic understanding of the gaps in the policies & guidelines. Policies & procedures are promulgated & absorbed into behaviours. Policies & procedures accepted as part of the culture & subject to audit. Policies & procedures are subject to review & improvement. Legal Research Support Legal support services are disorganised, research contracts and agreements are legally ad hoc supported, inconsistent and poorly publicised. Investment in legal expertise. Legal services identified & staffed. Responsibilities are defined. Documentation & awareness programs developed. Co-operation between legal experts & widespread availability of well documented services. Common knowledge available of all relevant legal research support topics. Widespread take up of legal services at an early stage in the research project. IPR and Privacy are acknowledged as critical to the institutional mission. Researcher’s feedback, research project’s lessons learned as well as analysis of awarded grant are used to update & improve legal research support services. IT infrastructure IT infrastructure provision is patchy, disorganised & poorly publicised & not supporting the whole research cycle. Funds are invested in technology & skills. Responsibilities are defined. Processes are established, defined & documented. Awareness of the different IT infra needs during the research cycle. Management shows active support. Facilities are well defined & communicated, standardised & integrated. The main aspects of the research cycle are supported in the IT infra. Key privacy aspects are secured in the IT infra. Infrastructure facilitates whole research cycle as well as special requests for Research IT infra. Management actively engaged. Documentation kept up to date. Privacy By Design implemented. Concerted efforts to maintain, update & publicise infrastructure. Metrics & feedback used to optimise services. Research IT staff hired for tailored research support. Based on the ANDS RDM Framework: http://ands.org.au/guides/capability-maturity 14
  • 16. Chief Information Security Officer Data Protection Officer Integrity Officer Ethical Committee … New roles and collaborations
  • 18. Further Information drs. Marlon Domingus project manager Research Data Management Erasmus University Rotterdam +31 10 4088006 domingus@ubib.eur.nl