Focus: Themes within Introduction and Context
|
|
- Georgina Horton
- 5 years ago
- Views:
Transcription
1 The following slides repeat the same pattern of; DICE DMP breakdown summary, general topics within the DMP topic, then UH Template questions. There are some generic examples and UH specific solutions. More details on all of these topics are included in individual section slides, which can be easily used instead of these slides for a longer session on Research Data Management. A simple DMP for students is also available to compliment this training. It can be used for notes regarding the various sections, or the participant s unique solutions. Focus: Themes within Introduction and Context - Basic information relating to the project; who, where, what, and roles. - Makes this a stand-alone document. - Require in the UH template, perhaps not RCUK or other funder templates. Highlight these questions are basic contact info and requirement on policies. The UH template has 19 context questions accounting for 29% of the DMP. Focus: UH template Introduction and Context - A brief description for context - Funding body requirements - Aims of the plan Highlight that these answers may change before the award, so should be completed post-award before submitting to the Document Management System (DMS). Focus: DICE breakdown of Data Types etc. - What data types will be created - How will it be collected - In what formats will your data be kept Highlight best to demonstrate to UH and your funder that your data is in a re-useable format, with risks that have been considered and that your work will be compatible with the future
2 Focus: ACTIVITY: What is Data? - Consider all of the documents, file types, and outputs and decide what is data that can be re-used and should be preserved. Highlight that development documentation, questionnaires, interviews and their transcripts, images, videos, CAD files, computer code, measurements, newspaper clippings are all data. Discuss what the researchers consider to be data: - What about their test runs? - What about the code that analyses the data? - What about the documentation that describes how the procedure works? - What about the hard copies of questionnaires and newspapers? Highlight that data is not just quantitative, and it s not just numbers. Anything that has scientific value could be reused and should be looked after and fully explained Focus: Themes within Data Types etc. - Basic description of what will be collected. - Include existing data to justify study - Why do you need new data? - Make sure it s all described with metadata. Highlight that new data is not always necessary; if existing data is ignore, your application may be rejected. Data is useless without metadata to describe it. Focus: UH template for Data Types etc. - Additional question for UH are about tools, software, and resources. - Are you including these expenses in your bid? Highlight most of this will be included in your funding bid at some point. It may not be in the DMP, but your funder will ask about it.
3 Focus: Data Types - This is all quantitative data - Qualitative data should also be identified Highlight most of these data types should be familiar to researchers. Mention also the less common data types specific to your audience. Focus: Data Types and formats - This are all common data but there is a variety of formats for each one - The use often depicts the format. Highlight that subjects have standard formats that are frequently used and often re-useable. Steer clear of instrument specific formats. Focus: DICE breakdown of Metadata - Data that describes your data. - Include Documents, Headers, Encoding - Many programs allow this to be stored within the file Highlight that as much as possible should be included to make sense of the data. This is useful during analysis and to others who could reuse these data including your future self. Focus: UH template for Data Metadata - Standard questions to ensure that you will generate metadata and store it with your data. Highlight most of this will be included in your funding bid at some point.
4 Focus: DICE breakdown of Ethics and IPR - Your Intellectual Property Rights belong to UH, but your colleagues may not own theirs and a contact may be needed for future deposit and reuse of data - Do you have consent from participants Highlight that considering reuse and deposit now with allow provisions to be included in consent and contracts. Focus: Themes within Legal and Ethical Issues - Consider copyright, database rights - Consent form participants and colleagues - Licensing - Who deals with disputes and FOIs? Highlight that these are likely to affect those who include human participants, and those with commercial partners. Refer to IPACS for more help. Focus: UH template for Legal and Ethical Issues - Standard questions to ensure that you have considered the ethics of your data and are prepared to manage them securely and anonymise before depositing these data. Highlight most of this will be included in your funding bid at some point. Focus: DICE breakdown of Ethics and IPR - Clearly, will your data be safe if it is sensitive? Highlight that this may require a password protected device or an encrypted volume in a networked drive.
5 Focus: ACTIVITY: Is the Data at risk? - How can these data be lost, damaged, or stolen? - What precautions are in place? Highlight that while there are risks, they can be limited. Discuss what the researchers consider to be data: - How can the data be lost? Is it on vulnerable devices flash sticks, CDs, laptops, external HDs? - Can it be stolen? Is it password protected, encrypted, or limited access only? - Is it openly accessible on the web? Could you close holes and/or password protect domains? - Is it backed up? If your HD got the tick of doom, could your work be recovered? Highlight that while data is at risk, there are security systems that can protect your data and a regular back up could save time, money, and people power. Focus: Themes within Short-term storage - Issues that affect your working data. - Where is it stored? - Is it backed up? - Is it secure? Highlight that these three issues affect all of your data and can be easily automated to protect your data. Focus: Movement of data - There is networked storage for everyone UH backed up and secure - Off-site mobile back up should not be kept with your laptop Highlight that version control will help keep track of which is the most up to date version. A local backup keeps recovery in your hands.
6 Focus: UH Storage - There is networked storage for everyone school and group drives and the DMS. - These have automatic back-ups, and the DMS has structure and versioning. Highlight access is to predefined UH members only and that sensitive information can be protected with granular security and encryption. Focus: Fire Damage - Regular off-site backup could save your research UH automatically backs up to College Lane and de Havilland daily. Highlight the risk of damage to data. This example is well documented from Southampton University million and no recovery or data. Can you imagine? Focus: Back Up procedures: Linux - crontab is a built in system that runs everyday and will perform tasks when told to. - rsync will copy data from the source location [src] to the destination [dest] updating only changes made so will save on CPU time. Highlight this to users who use Linux machines. Focus: Back Up procedures: Windows and Mac - Windows can do automatic backups using a tool in the control panel. - Time Machine is Mac s answer to back-ups producing a copy of your entire system on their cloud server. Be aware of their T&Cs on ownership and misuse. Highlight this to users who use Windows and Mac machines.
7 Focus: Security - Password protect devices so that if they-re lost, they can t be read - Encrypt sensitive data Highlight this as there are plenty of examples where data has been abused when found. Focus: Encryption - Encrypt with Truecrypt - Free, open source, on-the-fly encryption - All operating systems without install - Password protected folders - Sent by or on mobile/networked drive. Highlight this free and secures your data. Separate training session and How to Use Truecrypt Guide available. Focus: UH template for Short-term Storage - Standard questions to ensure that you have considered how to keep your data safe, secure, and backed up. Highlight most of this will be included in your funding bid at some point. Encourage the audience to set up a backup procedure if nothing else! Focus: DICE breakdown of Data Sharing and Access - This refers to sharing with other researchers via a website, a repository, or on request. - Consider your funder s requirements. Highlight that the University of Hertfordshire also requires that you make your data open. The UHRA is available if you do not have a subject repository.
8 Focus: ACTIVITY: What happens next? - What data could and should be published? - Where could they deposit their data where it will work for them? - Data will be credited as part of good research practice and it s in the funder s policies. Highlight that while the data is useful to them, what if they weren t there to make use of it. Ask participants to consider if they left research; - what would their legacy be? Could it be built upon? - Can the tools be made available to confirm their results and methodology? - Is the unprocessed data useful and available? - Is the processed data more useful and available? - How much data could be anonymised and made available? - Could be help the next generation or be the basis for a larger study? If they d had other data, could it have improved their research? Highlight the benefits of sharing data and encourage the participants to make as much useful data available as possible. However, also consider that too much data becomes useless and it must be well described. Focus: Themes within Data Sharing and Access - Who wants your data? - Why you can t share it? - How and where you will share it - Embargos, patents, and limitation on time. Highlight that they are expected to deposit and should show how they will make this possible if they can.
9 Focus: UH template for Data Sharing and Access - Standard questions about whom else may want your data and how they could get it. - How will they make their data available; will there an embargo or restrictions? Highlight that if data are sensitive there are provisions for restricted access to these data. Focus: DICE breakdown: Deposit and Preservation - In the long term, how will these data be managed? - An archive will make data available and keep it backed up and assessable. Highlight that the UHRA is available if you do not have a subject repository. Retention is recommended at 10 years since last use. Focus: Themes within Deposit and Preservation - How do you select which data will be kept? - Where will these data be deposited? - What supporting information comes with it metadata and documentation Highlight that not all data can be kept it s expensive and will become a data graveyard. Instead, useful data should be retained, managed, and well described and documented. Focus: Preserving stages - Researchers are familiar with publishing papers in a journal and open archive - Data should also be prepared for deposit in an archive and the UHRA data catalogue Highlight that if metadata and documentation is constructed during the collection and analysis steps, then data can easily be deposited as it s already prepared.
10 Focus: RCUK selection criteria - At present, there is no consensus as to what should be kept - Researchers should be prepared to keep useful data and tools - By 2015, it will be compulsory and if you don t deposit you will be penalised. Highlight that UH also has no guidelines as these matters are currently being discussed. Researchers should be prepared. Focus: UH template for Deposit and Preservation - Standard questions about the repository that you ve chosen and how you will manage sensitive data and retention. Highlight that if data are sensitive there are provisions for restricted access to these data in the UHRA and in many subject repositories.
Research Data Management For Researchers
For Researchers Information Hertfordshire With Bill Worthington, Sara Hajnassiri, and Mohamed Hansraj Research Councils The majority of data is funded by the Government through Research Councils and Universities.
More informationChecklist and guidance for a Data Management Plan, v1.0
Checklist and guidance for a Data Management Plan, v1.0 Please cite as: DMPTuuli-project. (2016). Checklist and guidance for a Data Management Plan, v1.0. Available online: https://wiki.helsinki.fi/x/dzeacw
More informationSwedish National Data Service, SND Checklist Data Management Plan Checklist for Data Management Plan
Swedish National Data Service, SND Checklist Data Management Plan 2017-10-16 Checklist for Data Management Plan Content Checklist for Data Management Plan... 1 Introduction to SND:s Checklist for Data
More informationScience Europe Consultation on Research Data Management
Science Europe Consultation on Research Data Management Consultation available until 30 April 2018 at http://scieur.org/rdm-consultation Introduction Science Europe and the Netherlands Organisation for
More informationNSF Data Management Plan Template Duke University Libraries Data and GIS Services
NSF Data Management Plan Template Duke University Libraries Data and GIS Services NSF Data Management Plan Requirement Overview The Data Management Plan (DMP) should be a supplementary document of no more
More informationRPg procedures for Research Data Management (RDM)
RPg procedures for Research Data Management (RDM) HKUL Research Data services http://lib.hku.hk/researchdata/ HKUL Research Data services http://lib.hku.hk/researchdata/help.htm Why Research Data MANAGEMENT
More informationData Management Checklist
Data Management Checklist Managing research data throughout its lifecycle ensures its long-term value and prevents data from falling into digital obsolescence. Proper data management is a key prerequisite
More informationDeveloping a Research Data Policy
Developing a Research Data Policy Core Elements of the Content of a Research Data Management Policy This document may be useful for defining research data, explaining what RDM is, illustrating workflows,
More informationEC Horizon 2020 Pilot on Open Research Data applicants
Data Management Planning EC Horizon 2020 Pilot on Open Research Data applicants Version 3.1 August 2017 University of Bristol Research Data Service Image: Global European Union, S. Solberg, Wikimedia,
More informationDATA MANAGEMENT PLANS Requirements and Recommendations for H2020 Projects. Matthias Razum April 20, 2018
DATA MANAGEMENT PLANS Requirements and Recommendations for H2020 Projects Matthias Razum April 20, 2018 DATA MANAGEMENT PLANS (DMP) typically state what data will be created and how, outline the plans
More informationOPEN DATA. Dr Arthur Smith Dr Marta Teperek 15/06/2015. Slides: University of Cambridge
OPEN DATA Slides: Dr Arthur Smith Dr Marta Teperek 15/06/2015 http://www.data.cam.ac.uk/files/odchemistry.pdf University of Cambridge Open Access: making scholarly research outputs freely available to
More informationResearch Data Management Procedures and Guidance
Research Data Management Procedures and Guidance Author: Members of the Research Data Management Project Team from REN, ISD and LIB, working from original document prepared by Raymond Scott (ISD) Date:
More informationFormatting, Organising and Storing Data
Formatting, Organising and Storing Data Scott Summers UK Data Service University of Essex Cancer Research UK Data Sharing and Management 24 th May 2017 Overview Looking after research data for the longer-term
More informationDATA SELECTION AND APPRAISAL CHECKLIST University of Reading Research Data Archive
Research and Enterprise Services DATA SELECTION AND APPRAISAL CHECKLIST University of Reading Research Data Archive Introduction This Selection and Appraisal Checklist provides a set of criteria against
More informationMake your own data management plan
Make your own data management plan Ali, Abdurhman Kelil, PhD University Library April 17, 2018 Learn how to manage your research data according to best practice! Research Data Management Lifecycle Search
More informationDATA PRESERVATION AND SHARING INITIATIVE. 1. Aims of the EORTC QLG Data Repository project
DATA PRESERVATION AND SHARING INITIATIVE 1. Aims of the EORTC QLG Data Repository project The European Organisation for Research and Treatment of Cancer (EORTC) Quality of Life Group Data Repository project
More informationResearch Data Management. What s in it for me?
Research Data Management What s in it for me? So, what is Research Data Management I hear you ask? Well before we start on the management let s think about research data What is it? What forms could it
More informationWhere to store research data during and after a project. Dr. Chris Emmerson Research Data Manager
Where to store research data during and after a project Dr. Chris Emmerson Research Data Manager Welcome Research Data Service Data Lifecycle Data Storage Questions 1 Research Data Service 2 Research Data
More informationScientific Research Data Management Policy
Scientific Research Data Management Policy DOCUMENT SUMMARY Document No. SRDMP-0001 Ref. Document Title Author(s) Policy Sponsor Scientific Research Data Management Policy Karen Ambrose Alison Davis DOCUMENT
More informationOpus: University of Bath Online Publication Store
Pink, C. and Cope, J. (2012) Managing Your Research Data (Presentation). UNSPECIFIED. (Unpublished) Link to official URL (if available): Opus: University of Bath Online Publication Store http://opus.bath.ac.uk/
More informationDataFlow and VIDaaS Workshop
Take Charge of Your Data DataFlow and VIDaaS Workshop Data Management at Oxford Professor Paul Jeffreys, Director of IT, University of Oxford SAID Business School, 2 March 2012 Digital Services In summer
More informationISO Self-Assessment at the British Library. Caylin Smith Repository
ISO 16363 Self-Assessment at the British Library Caylin Smith Repository Manager caylin.smith@bl.uk @caylinssmith Outline Digital Preservation at the British Library The Library s Digital Collections Achieving
More informationSharing Qualitative Data: Challenges and Opportunities
Sharing Qualitative Data: Challenges and Opportunities Libby Bishop UK Data Service University of Essex University of Central Lancashire Open Scholarship Month Event Preston 2 March 2016 Proposal for the
More informationGuidelines for Depositors
UKCCSRC Data Archive 2015 Guidelines for Depositors The UKCCSRC Data and Information Life Cycle Rod Bowie, Maxine Akhurst, Mary Mowat UKCCSRC Data Archive November 2015 Table of Contents Table of Contents
More informationIF ONLY WE D KNOWN: COLLECTING RESEARCH DATA
FACULTY LIBRARY OF ARTS & PHILOSOPHY IF ONLY WE D KNOWN: COLLECTING RESEARCH DATA Katrien Deroo - LW Research Day WHAT IS DATA MANAGEMENT ABOUT? Spreadsheet bursting at the seams Database reconstruction
More informationPOC Evaluation Guide May 09, 2017
POC Evaluation Guide May 09, 2017 This page intentionally left blank P r o p r i e t a r y a n d C o n f i d e n t i a l. 2 0 1 7 R F P M o n k e y. c o m L L C Page 2 CONTENTS Read Me First... 4 About
More informationChecklist for a Data Management Plan (v3.0, 17 March 2011)
Intro Checklist for a Data Management Plan (v3.0, 17 March 2011) Martin Donnelly, Digital Curation Centre, University of Edinburgh Sarah Jones, Digital Curation Centre, University of Glasgow This document
More informationData Management Planning
Data Management Planning BBSRC funding applicants www.le.ac.uk/researchdata Author Andrew Burnham Date 20 February 2013 (original 15 July 2013) Version 1-1 URL File Reviewed by http://www.le.ac.uk/researchdata
More informationEthical Review Manager. Applicant User Guide
Ethical Review Manager Applicant User Guide Last Updated: June 2017 Introduction The Ethical Review Manager (ERM) System has been designed to enable applications for ethical approval to conduct research
More informationData Management Plans. Sarah Jones Digital Curation Centre, Glasgow
Data Management Plans Sarah Jones Digital Curation Centre, Glasgow sarah.jones@glasgow.ac.uk Twitter: @sjdcc Data Management Plan (DMP) workshop, e-infrastructures Austria, Vienna, 17 November 2016 What
More informationRecords Information Management
Information Systems Sciences Records Information Management Region V Spring Conference March 26, 2015 Was I supposed to keep that 1 Where did we store that 2 Space Issues. Need storage space for a classroom
More informationIntégrité scientifique: Data Research Management
Intégrité scientifique: Data Research Management Definition of research data Research data are collected, observed or created, for the purposes of analysis to produce and validate original research results.
More informationHorizon2020/EURO Coordination and Support Actions. SOcietal Needs analysis and Emerging Technologies in the public Sector
Horizon2020/EURO-6-2015 Coordination and Support Actions SOcietal Needs analysis and Emerging Technologies in the public Sector Deliverable D1.2 The SONNETS Research Data Management Plan Workpackage Editor(s):
More informationLevel 5 Diploma in Computing
Level 5 Diploma in Computing 1 www.lsib.co.uk Objective of the qualification: It should available to everyone who is capable of reaching the required standards It should be free from any barriers that
More informationData Management Dr Evelyn Flanagan
Data Management Dr Evelyn Flanagan e.flanagan@ucc.ie DATA MANAGEMENT OVERVIEW Role of the Data Manager in Clinical Trials General understanding of the principles underpinning data management for clinical
More informationData Management Plan Generic Template Zach S. Henderson Library
Data Management Plan Generic Template Zach S. Henderson Library Use this Template to prepare a generic data management plan (DMP). This template does not correspond to any particular grant funder s DMP
More informationData management Backgrounds and steps to implementation; A pragmatic approach.
Data management Backgrounds and steps to implementation; A pragmatic approach. Research and data management through the years Find the differences 2 Research and data management through the years Find
More informationTransUnion Direct User Guide
Topics Welcome to TransUnion Direct... 2 The First Time You Log Into TransUnion Direct... 4 Individual Services... 5 Portfolio Services... 15 Activity Reports... 17 Your User Profile... 19 Help Resources...
More informationPrivacy Policy: International Confederation on Amputee Associations (IC2A) Policy document issue date: 25 May 2018 Updated: 5 October 2018
Privacy Policy: IC2A Contents 1. Privacy commitment... 2 2. Named data protection officer... 2 3. Information IC2A collects and processes personally identifiable information... 2 3.1 As a representative
More informationEMELD Working Group on Resource Archiving
EMELD Working Group on Resource Archiving Language Digitization Project, Conference 2003: Digitizing and Annotating Texts and Field Recordings Preamble Sparkling prose that briefly explains why linguists
More informationFile Protection Whitepaper
File Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of File Protection over traditional file copy methods... 3
More informationRestore Tab. User Guide
Restore Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Home page... 3 3. Tools menu... 4 4. The Integrated Restore Console... 5 5. Integrated Restore Console
More informationEthics and Omics. Jeffrey Engler, Ph.D. Dept of Biochemistry and Molecular Genetics Associate Dean, UAB Graduate School
Ethics and Omics Jeffrey Engler, Ph.D. Dept of Biochemistry and Molecular Genetics Associate Dean, UAB Graduate School Office of Research Integrity/DHHS http://ori.hhs.gov/education/products /clinicaltools/data.pdf
More informationData Protection Policy
Data Protection Policy Status: Released Page 2 of 7 Introduction Our Data Protection policy indicates that we are dedicated to and responsible of processing the information of our employees, customers,
More informationData Management Plan
Data Management Plan Mark Sanders, Martina Chýlková Document Identifier D1.9 Data Management Plan Version 1.0 Date Due M6 Submission date 30 November, 2015 WorkPackage WP1 Management and coordination Lead
More informationMicrosoft Office PowerPoint 2016: Part 2 (Advanced)
10442020 Microsoft Office PowerPoint 2016: Part 2 (Advanced) Meetings, instruction, training, pitches; these are all a part of our daily lives. Some of these presentations include sensitive information
More informationLinda Strick Fraunhofer FOKUS. EOSC Summit - Rules of Participation Workshop, Brussels 11th June 2018
Linda Strick Fraunhofer FOKUS EOSC Summit - Rules of Participation Workshop, Brussels 11th June 2018 EOSC Business Models, Data Management Policies, Data Security & Legal Issues 16:30 17:16 Room 0B Panelists:
More informationChapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/
Chapter 1 Storage Concepts 4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and
More informationToucan Telemarketing Ltd.
Toucan Telemarketing Ltd. GDPR Data Protection Policy Introduction Toucan Telemarketing is committed to protecting the rights and freedoms of data subjects and safely and securely processing their data
More informationOracle Banking Digital Experience
Oracle Banking Digital Experience Retail Accounts User Manual Release 17.2.0.0.0 Part No. E88573-01 July 2017 Retail Accounts User Manual July 2017 Oracle Financial Services Software Limited Oracle Park
More informationLEOcoin Private Chat wallet FAQ V 1
LEOcoin Private Chat wallet F V 1 Staking. With the old LEOcoin wallet, I was staking twice a day and getting my rewards within the hour. New wallet says staking opportunities will be every 30 days. Do
More informationIJDC General Article
Developing a Data Vault Stuart Lewis Lorraine Beard Edinburgh University Library The University of Manchester Library Mary McDerby Robin Taylor IT Services The University of Manchester Edinburgh University
More informationCloud Security Whitepaper
Cloud Security Whitepaper Sep, 2018 1. Product Overview 3 2. Personally identifiable information (PII) 3 Using Lookback without saving any PII 3 3. Security and privacy policy 4 4. Personnel security 4
More informationPreview from Notesale.co.uk Page 12 of 49
SECTION I: FUNDAMENTALS OF COMPUTING [cont d] 8. describe ways of caring for computers and peripherals in the working environment; 9. discuss health and safety factors associated with computer use. General
More informationDATA PROTECTION AND PRIVACY POLICY
DATA PROTECTION AND PRIVACY POLICY Data Protection Act London Capital Group (Cyprus) Limited (LCG) may process information relating to you, including holding such information in a manual format or electronic
More informationThe Learner can: 1 Follow recommended safe practices
Unit Title: Communicating Information Using ICT OCR unit number: 3 Level: Entry 3 Credit value: 3 Guided learning hours: 15 Unit reference number: H/502/1197 Learning Outcomes Assessment Criteria The Learner
More informationCollection Policy. Policy Number: PP1 April 2015
Policy Number: PP1 April 2015 Collection Policy The Digital Repository of Ireland is an interactive trusted digital repository for Ireland s contemporary and historical social and cultural data. The repository
More informationGUIDELINES FOR MASTER OF SCIENCE INTERNSHIP THESIS
GUIDELINES FOR MASTER OF SCIENCE INTERNSHIP THESIS Dear Participant of the MScIS Program, If you have chosen to follow an internship, one of the requirements is to write a Thesis. This document gives you
More information8 MANAGING SHARED FOLDERS & DATA
MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationScientific Data Policy of European X-Ray Free-Electron Laser Facility GmbH
6 June 2017 Scientific Data Policy of European X-Ray Free-Electron Laser Facility GmbH as approved by the Council on 30 June 2017 1 Preface... 2 2 Definitions... 2 3 General principles... 5 4 Raw data
More informationFair data and open data: differences and consequences
Fair data and open data: differences and consequences 1. To share or not to share: what is fair? Alex Burdorf, Erasmus MC Rotterdam 2. Data sharing: consequences for informed consent Marie-José Bonthuis,
More informationCompleting & Submitted the IRB Approval of Human Subjects Form
Completing & Submitted the IRB Approval of Human Subjects Form All areas of the form should be completed. Once completed it must be submitted to the IRB by sending it to the EU IRB Chairperson. The following
More informationCode42 Defines its Critical Capabilities Methodology
Tech Overview Product Defines its Critical Capabilities Methodology A technical analysis of top enterprise requirements from the leader in enterprise endpoint backup No enterprise technology purchase is
More informationSTUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY
STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY Introduction The college offer an extensive range of IT systems across campuses and online for course related activities and drop-in purposes. This policy applies
More informationData protection policy
Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees
More informationManagement: A Guide For Harvard Administrators
E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered
More informationGuide to Supplemental Materials
Guide to Supplemental Materials October 7, 2017 A submitted manuscript should stand on its own, i.e., it should make a sound presentation of the rationale, research questions, and methods and data analyses,
More informationSurvey of Research Data Management Practices at the University of Pretoria
Survey of Research Data Management Practices at the University of Pretoria Undertaken by the Department of Library Services in order to improve research practices at the University Unisa Library Open Access
More informationBasic Requirements for Research Infrastructures in Europe
Dated March 2011 A contribution by the working group 1 Access and Standards of the ESF Member Organisation Forum on Research Infrastructures. Endorsed by the EUROHORCs on 14 April 2011. Introduction This
More informationFeed the Future Innovation Lab for Peanut (Peanut Innovation Lab) Data Management Plan Version:
Feed the Future Innovation Lab for Peanut (Peanut Innovation Lab) Data Management Plan Version: 20180316 Peanut Innovation Lab Management Entity The University of Georgia, Athens, Georgia Feed the Future
More informationInformation Handling and Classification Table
Information Handling and Classification Table Title: Information Classification and Handling Table Reference: IS-07a Status: Approved Version: 1.2 Date: March 2018 Classification: Non-Sensitive/Open Author(s)
More informationGuideline on Data Handling and Methods Reporting (DHMR) TSB (School of Social and Behavioral Sciences) Science Committee, 2017
TSB Guideline on Data Handling and Methods Reporting (DHMR) 1 Guideline on Data Handling and Methods Reporting (DHMR) TSB (School of Social and Behavioral Sciences) Science Committee, 2017 The origin of
More informationDelivery guide: SAGE Video
Delivery guide: SAGE Video Our Trainers have put together this training delivery guide to accompany the SAGE Video training presentation. If you plan on delivering the training presentation to educate
More informationBackupAssist V4 vs. V6
TECHNICAL COMPARISON BackupAssist Version 4 vs. Version 6 www.backupassist.com 2 What are the major new features in BackupAssist v6? Ready for Server 2008 and 2008 R2 Internet Backup capabilities File
More informationMaintain Data Control and Work Productivity
DATA SHEET CloudAlly Backup The Complete Microsoft 365 Solution: Office 365 Exchange, SharePoint, and OneDrive KEY CAPABILITIES CloudAlly s cloud-to-cloud backup solution for the complete Microsoft cloud
More informationThe checklist is dynamic, not exhaustive, and will be updated regularly. If you have any suggestions or comments, we would like to hear from you.
3 Design The checklist is dynamic, not exhaustive, and will be updated regularly. If you have any suggestions or comments, we would like to hear from you. Data oriented design requirements Minimise and
More informationNHS Education for Scotland Portal https://www.portal.scot.nhs.uk Dental Audit: A user guide from application to completion
Dental Audit: A user guide from application to completion 1. Audit Guidance 2. New Application: Getting Started 3. New Application: The Audit Application Form 4. New Application: Submitting Your Application
More informationGoing Paperless & Remote File Sharing
Going Paperless & Remote File Sharing Mary Twitty Family Services Director Earnest L. Hunt-Director of Sub-recipient Monitoring Tammy Smith Program Director Introduction Define the subject matter Move
More informationWhen Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.
When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the
More informationForthcoming Deposit Agreement of FSD ARJA KUULA CES2012: DATA ACQUISITION AND LICENSE AGREEMENTS 5TH OCTOBER 2012, TAMPERE, FINLAND
Forthcoming Deposit Agreement of FSD ARJA KUULA CES2012: DATA ACQUISITION AND LICENSE AGREEMENTS 5TH OCTOBER 2012, TAMPERE, FINLAND 2 FSD Upgrade fsd.uta.fi/ en/ news/ FSDupgrade.html Four year project
More informationAcronis Data Cloud plugin for ConnectWise Automate
Acronis Data Cloud plugin for ConnectWise Automate USER S GUIDE Revision: 17.01.2018 Table of contents 1 Introduction...3 2 What s new in Update 3...3 3 What s new in Update 2...3 4 What s new in Update
More informationCOMPUTE CANADA GLOBUS PORTAL
COMPUTE CANADA GLOBUS PORTAL Fast, user-friendly data transfer and sharing Jason Hlady University of Saskatchewan WestGrid / Compute Canada February 4, 2015 Why Globus? I need to easily, quickly, and reliably
More informationFile Protection. Whitepaper
Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of... 3 2. Backup considerations... 4 Exchange VM support... 4 Restore
More informationBusiness Processes for Managing Engineering Documents & Related Data
Business Processes for Managing Engineering Documents & Related Data The essence of good information management in engineering is Prevention of Mistakes Clarity, Accuracy and Efficiency in Searching and
More informationKaspersky Small Office Security 5. Product presentation
Kaspersky Small Office Security 5 Product presentation CONTENTS 1 Target audience challenges and product info 3 Selling tips 2 4 Product overview Competitive overview 2 SMALL COMPANIES CHALLENGES General
More informationICS-ACI Policy Series
ICS-ACI Policy Series This is part of a series of documents that make up the formal policies adopted by the Institute for CyberScience at the Pennsylvania State University. Last Updated: September 5, 2017
More informationPS Mailing Services Ltd Data Protection Policy May 2018
PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect
More informationNHSmail Migration Communications Plan Template
NHSmail Migration Communications Plan Template June 2018 Version 2 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created
More informationNATIONAL CYBER DEFENSE COMPETITION. Competition Rules
NATIONAL CYBER DEFENSE COMPETITION Competition Rules IOWA STATE UNIVERSITY, INFORMATION ASSURANCE CENTER SPRING 2013 Definitions CDC Cyber Defense Competition ISEAGE Internet Scale Event Attack Generation
More informationUser guide. Created by Ilse A. Rasmussen & Allan Leck Jensen. 27 August You ll find Organic Eprints here:
Fact sheet: Screenshot Manual User guide Created by Ilse A. Rasmussen & Allan Leck Jensen 27 August 2013 You ll find Organic Eprints here: http://www.orgprints.org/ Page 1/38 Fact sheet: Screenshot Manual
More informationSystem Assessment Report Relating to Electronic Records and Electronic Signatures; 21 CFR Part 11. System: tiamo (Software Version 2.
Page 1 /15 System Assessment Report Relating to Electronic Records and Electronic Signatures; 21 CFR Part 11 System: tiamo (Software Version 2.5) Page 2 /15 1 Procedures and Controls for Closed Systems
More informationFind funding on Research Professional Training session
Find funding on Research Professional Training session Gaelle Jolly Senior Information & Communications Officer Research Services research.services@admin.ox.ac.uk Hilary term 2018 Research funding opportunities
More informationFile Protection Whitepaper
Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of over traditional file copy methods... 3 2. Backup considerations...
More informationData Management: the What, When and How
Data Management: the What, When and How Data Management: the What DAMA(Data Management Association) states that "Data Resource Management is the development and execution of architectures, policies, practices
More information16/17. BOXI A step by step guide. Creating folders, saving, running and scheduling BOXI reports. University of Birmingham
University of Birmingham BOXI A step by step guide Creating folders, saving, running and scheduling BOXI reports Taught Student Administration 16/17 Creating folders in BOXI Purpose Creating folders in
More informationE-guide CISSP Prep: 4 Steps to Achieve Your Certification
CISSP Prep: 4 Steps to Achieve Your Certification Practice for the exam and keep your skills sharp : Thank you for downloading our CISSP certification guide. Aside from this handy PDF, you can also access
More informationSecurity in the Privileged Remote Access Appliance
Security in the Privileged Remote Access Appliance 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property
More informationIntroduction to BS 7671 E-learning Guide
Introduction to BS 7671 E-learning Guide Welcome to the SELECT E-learning package on BS 7671. This course has been created to help you prepare for your day-training course on BS 7671. Completion of this
More informationSURGICAL REVIEW CORPORATION Privacy Policy
SURGICAL REVIEW CORPORATION Privacy Policy Your privacy is very important to us. Please read below to see how Surgical Review Corporation ( SRC ) handles information. SRC respects your privacy and shares
More information