DATA MANAGEMENT PLANS
|
|
- Isaac Pierce
- 5 years ago
- Views:
Transcription
1 DATA MANAGEMENT PLANS DeeAnn Allison 317 Love Library (402) Leslie Delserone 210 C.Y. Thompson Library (402)
2 Required by many federal funding agencies Required for responsible research, including reproducibility. Establishes provenance for original research data Starts before project initiation and is followed through the life of the project During or upon project completion, data are stored (preserved) for : Retrieval and re-use by the researcher or others Sharing with a broader community (based on the funder s requirements and the researcher s data management plan) What is going to be collected? DATA MANAGEMENT - WHY? What are the formats? How will data be stored and protected? What will be shared? What will I do when the project is complete?
3 A recent retraction notice for a 2007 paper in the Journal of Clinical Investigation: It has come to our attention that some of the panels in Figure 5 appear to be duplications of each other. The authors are unable to provide the original source files that were used to generate these data. In the absence of the original data that verify the integrity of the images, the JCI Editorial Board has decided to withdraw Figure 5 from the scientific record. No issues have been raised in regard to any of the other data in this manuscript. The authors concur with this course of action. Source: DATA MANAGEMENT MATTERS
4 Many federal funders require data management plans - you don t want your grant proposal refused because you didn t do an adequate job. Check the funding agency s requirements more than once during your proposal preparation because their requirements are changing DATA MANAGEMENT IS A MOVING TARGET
5 Data management plans typically focus on the data management process: Data content and format Data collection, documentation and storage Data security and sharing ( rights ) Data retention and preservation; includes task assignments for data life cycle The disciplinary field and nature of the study will influence these decisions WHAT IS A DATA MANAGEMENT PLAN?
6 Data exist in a variety of formats Ideally a format should be nonproprietary Consider data normalization so data can be interpreted correctly File compression can be useful but you must understand the consequences De-identifying data is critical FILE FORMATS AND TRANSFORMATIONS
7 Select a format that will be most usable for the life cycle of the project The PRONOM registry ( is a useful site about formats Domain registries also have requirements about file formats for deposits Librarians can also answer questions and make suggestions FORMATS A file format is a way of encoding information within a digital file. A program or application must recognize the file format in order to access the file.
8 Considerations for format selection(s): Verify that the technical specification for the formats is available Use a well-established format that is in wide use Select a stable format that isn t under going rapid change Formats that support metadata are a plus because they can provide provenance and technical characteristics Avoid formats with built-in features and functionality that can become obsolete and/or lose functionality when they are migrated Select formats with error detection to keep your data from becoming corrupt (e.g., PNG uses byte sequences to check for errors) Text files can be human readable and use a character encoding standard, while binary files can only be read by software that handle that format
9 Potential risks for loss or corruption on conversion or migration to new media: o Word files fonts, text formatting, headers, footers, footnotes, links to other documents, any embedded functionality o Numeric files special characters (such as quotation marks), end of line returns, last characters in rows (due to row size limitations), last rows (due to row number limitations), formulae o Database files as above, but also relationships between tables o Multimedia files artifacts or distortion, loss of layers, color, resolution, and changes in codecs o File sizes may change and even become much larger FORMAT CHALLENGES
10 Some TIPS Agree on scale and other characteristics that support comparisons and interpretation Non-numeric qualitative data should be converted to numbered (quantitative) data that is standardized. This is called statistical normalization (where a formula is used to transform values into numbers that can be better compared) Database normalization is a set of design rules that eliminate duplication and inconsistency Interoperability requires normalized data Normalized data conform to common characteristics allowing for easy re-use by different users and/or the data to be understood by different applications NORMALIZATION
11 Saves space on storage devices and reduces transmission time when files are transferred over networks Some issues with compression Compressed files are subject to corruption and are more difficult to recover Some files don t save much space when compressed (multimedia files), while text files can save much space (up to 90%) Avoid lossy file compression types. Tiff images are lossless so you can make copies from them without losing quality Compressed files can take a long time to decompress so best for files that are no longer in active use FILE COMPRESSION
12 DATA CONTENT, FORMAT, & STORAGE IN A PLAN Type of Data Physical specimens Description of Data Soil samples Morphologically-analyzed specimens, stored for future PCR amplifications Voucher specimens: Individual specimen, fixed on glass microscope slide Individual specimen, stored in formalin Measurements of specimens Digital images Nucleotide sequences Sequence alignments, trees Range of characteristics measured; presence/absence of structures noted. Stored in Excel spreadsheets (flat file) for later export as.csv into Specify6 database Photomicrographs of each specimen, and scanning electron images of selected specimens, in JPG and TIFF formats FileMaker Pro v.7 files containing unique specimen identified and amplified sequence data using three primer sets FASTA files for submissions to GenBank
13 Privacy individual is known/identified Privacy concern what data may be collected and/or shared about this individual? Confidentiality identity of individual is not to be disclosed Confidentiality concern are there data that identify, or could be used to identify, a research participant? PRIVACY & CONFIDENTIALITY
14 Anonymization is the removal of any identifiers, such as name and address, that could be used to link data with an individual Replace sensitive information with machine generated codes Aggregate the data into related categories to provide analysis at a higher level than the level of the data collection. Census data are often aggregated Perturbation: Techniques for the release of data that change the data before the dissemination in such a way that the disclosure risk for the confidential data is decreased but the information content is retained as far as possible. (source: DE-IDENTIFICATION OF DATA
15 Documentation careful information-gathering on the who, what, where, when, and why of your research often an idiosyncratic, human-powered process Formats paper field or laboratory notebooks, digital photos DOCUMENTATION AND METADATA
16 Metadata data about data often standards-based describes the research data collection, but also captures other information (administrative, technical) generated manually &/or automatically DOCUMENTATION AND METADATA
17 METADATA IN A PLAN Type of Data Physical specimens Measurements of physical specimens Digital images Nucleotide sequences Sequence alignments, trees Description of Metadata We will utilize the Darwin Core metadata scheme. This standard is straightforward, sufficiently descriptive, and widely adopted by evolutionary biologists and ecologists. Each specimen is assigned a unique identifier. We will work with a metadata expert from UNL Libraries to create a template that captures each specimen s metadata and that conforms to the data submission requirements of relevant museums and repositories. Darwin Core metadata embedded in each JPG and TIFF file Unique identifier connects sequence to specimen s provenance metadata GenBank s required metadata for submission, including accession number
18 What are the relevant data and metadata standards in your area of research/discipline? How will you capture the metadata (manually, automatically, both)? How will you merge documentation with metadata? Do you have a data dictionary, controlled vocabulary, or code book that should be shared? APPLICATION TO YOUR RESEARCH
19 Professional societies, research journals University Libraries Data Curation Committee Librarian assigned to your department or program ( ) ASSISTANCE
20 Keeping data safe and secure is your responsibility Follow the policies and practices set-up by your college and the University Information Technology Services can assist with security planning Never accept or store Social Security Numbers ( Effective January 1, 2007, Social Security Numbers (SSNs) - including any portion of the full nine digits-shall not be electronically collected, transmitted, or stored via University-sponsored services or using University-owned computing equipment, information systems or networks unless specifically authorized in writing by officials designated by the Chancellor. Individuals or departments that collect, transmit or store SSNs will take steps necessary to secure this data using best practices identified by the Chief Information Officer. Failure to comply with this policy after January 1, 2007 may result in disciplinary actions taken by the University. STORAGE & SECURITY
21 Who will be responsible for securing sensitive data? Are there privacy issues? Are there data relating to human subjects? What are the policies/procedures/ethical requirements regarding these data? How will privacy &/or confidentiality requirements be enforced? By whom? QUESTIONS
22 Local control: Know where your data are located and who has access Never share passwords or leave them visible or accessible Know the number of copies (of files, notebooks, etc.) and where they are stored Safeguard all local copies (laptops, USB drives, notebooks, etc.) Sanitize drives you no longer need to ensure data is not recoverable Back-up your data KEYS TO DATA SECURITY
23 Network-level (and beyond) control: Use encryption and firewalls when appropriate Keep your virus protection up to date Take precautions when you send data via Ensure that remote access (off campus) connections are made securely using SSH or VPN ( Use a centrally managed server when possible Understand your rights when you deposit in a domain depository KEYS TO DATA SECURITY
24 Are any of the data copyrighted? Who holds copyright? Third-party ownership of the data? Licensing/repository policy on re-use of the data, its citation, production of derivatives? Any time-restrictions on access or use of the data? Metadata requirements to ensure accessibility? DATA RIGHTS AND ACCESS
25 Are the data subject to open-access requirements? FOIA requests? Expectations of the funders? Licensing (Creative Commons, Open Knowledge Foundation) Access through trusted repositories (e.g., DRYAD, ICPSR) DATA RIGHTS AND ACCESS
26 DATA SECURITY & SHARING IN A PLAN All digital data are stored on password-protected computers in the laboratory. These data are backed up weekly - manually on external hard drives by assigned laboratory technicians, and virtually by the University. Physical specimens are stored in secure coldrooms and secure laboratory spaces. All parties involved in this research are committed to the free and open sharing of scientific data produced during this research. The data are low-risk; we anticipate no sensitive or confidential data. Under the terms of the Open Data Commons Open Data License (ODbL 1.0; users may share, create, and/or adapt the data; we request attribution, sharing by users under the terms of the ODbL, and redistribution without digital restriction measures.
27 Local copy for researcher use (desktop, laptop) Local cop(ies) for access and preservation (UNL Library Data Repository) Off-site copy for disaster recovery (UNL ITS, cloud storage) Access through a domain repository (DRYAD) RETENTION & PRESERVATION
28 Disciplinary repositories exist for many areas of study ( ) DataCite - to find, access, and reuse data. Its listing, DataBIB ( is a tool to identify and locate online repositories of research data. Users and bibliographers create and curate records that describe data repositories that users can search Digging into Data - list of digital libraries, data archives and repositories ( 7/Default.aspx) re3data.org registry - research data repositories from all academic disciplines ( UNL Data Registry - deposit and register your data, even if it is not stored in our repository, to improve its discovery ( DOMAIN REGISTRIES/REPOSITORIES
29 DATA RETENTION & PRESERVATION IN A PLAN Physical specimens: The Laboratory retains soil samples in cold storage for five years, and frozen specimens used for PCR amplifications indefinitely. The Laboratory retains metadata associated with physical specimens indefinitely. Digital images, and nucleotide sequences, sequence alignments, and trees: Digital images (TIFF masters), nucleotide sequences, and associated metadata will be archived indefinitely in UNL s centralized data storage repository, a secure, lowcost and stable data archive, operated by UNL Libraries on behalf of the research faculty. The archive s terms of service include regular checks of data integrity. The proposal budget includes, in the final budget year, the one-time cost for 500 GB of storage.
30 Subject librarians - assist with data management planning ( Guide to data management ( Website covering data management ( ADDITIONAL RESOURCES
31 Visiting scholar Karla Strieb (Ohio State) 22 April 2014, 2p Unity Room (202), Gaughan Multicultural Center Panel of UNL faculty, administrators, and Strieb will discuss efforts at UNL to comply with the federal mandate regarding data access and sharing LEARN MORE ABOUT FEDERAL FUNDERS EXPECTATIONS
32 Describe the data you are going to collect include file formats and metadata standards (if known) How will the data be maintained? Back-ups, multiple copies, other options who will do this? Will there be public access to the data? If so, how and when? Are there any privacy concerns how will you address these? Where do you plan to deposit your data? How long will the data be maintained and available? If longterm, what are the provisions for long-term management? Budget considerations for data maintenance? your plans to: ASSIGNMENT: CREATE A DATA MANAGEMENT PLAN
Data Management Checklist
Data Management Checklist Managing research data throughout its lifecycle ensures its long-term value and prevents data from falling into digital obsolescence. Proper data management is a key prerequisite
More informationDIGITAL STEWARDSHIP SUPPLEMENTARY INFORMATION FORM
OMB No. 3137 0071, Exp. Date: 09/30/2015 DIGITAL STEWARDSHIP SUPPLEMENTARY INFORMATION FORM Introduction: IMLS is committed to expanding public access to IMLS-funded research, data and other digital products:
More informationChecklist and guidance for a Data Management Plan, v1.0
Checklist and guidance for a Data Management Plan, v1.0 Please cite as: DMPTuuli-project. (2016). Checklist and guidance for a Data Management Plan, v1.0. Available online: https://wiki.helsinki.fi/x/dzeacw
More informationDeveloping a Research Data Policy
Developing a Research Data Policy Core Elements of the Content of a Research Data Management Policy This document may be useful for defining research data, explaining what RDM is, illustrating workflows,
More informationData Curation Handbook Steps
Data Curation Handbook Steps By Lisa R. Johnston Preliminary Step 0: Establish Your Data Curation Service: Repository data curation services should be sustained through appropriate staffing and business
More informationScience Europe Consultation on Research Data Management
Science Europe Consultation on Research Data Management Consultation available until 30 April 2018 at http://scieur.org/rdm-consultation Introduction Science Europe and the Netherlands Organisation for
More informationDRS Policy Guide. Management of DRS operations is the responsibility of staff in Library Technology Services (LTS).
Harvard University Library Office for Information Systems DRS Policy Guide This Guide defines the policies associated with the Harvard Library Digital Repository Service (DRS) and is intended for Harvard
More informationData Curation Profile Movement of Proteins
Data Curation Profile Movement of Proteins Profile Author Institution Name Contact J. Carlson Purdue University J. Carlson, jrcarlso@purdue.edu Date of Creation July 14, 2010 Date of Last Update July 14,
More informationNSF Data Management Plan Template Duke University Libraries Data and GIS Services
NSF Data Management Plan Template Duke University Libraries Data and GIS Services NSF Data Management Plan Requirement Overview The Data Management Plan (DMP) should be a supplementary document of no more
More informationUC Irvine LAUC-I and Library Staff Research
UC Irvine LAUC-I and Library Staff Research Title Research Data Management: Local UCI Outreach to Faculty Permalink https://escholarship.org/uc/item/18f3v1j7 Author Tsang, Daniel C Publication Date 2013-02-25
More informationData Curation Profile Botany / Plant Taxonomy
Profile Author Sara Rutter Author s Institution University of Hawaii at Manoa Contact srutter@hawaii.edu Researcher(s) Interviewed [withheld], co-pi [withheld], PI Researcher s Institution University of
More informationUNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017
UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets
More informationNational Data Sharing and Accessibility Policy-2012 (NDSAP-2012)
National Data Sharing and Accessibility Policy-2012 (NDSAP-2012) Department of Science & Technology Ministry of science & Technology Government of India Government of India Ministry of Science & Technology
More informationFocus: Themes within Introduction and Context
The following slides repeat the same pattern of; DICE DMP breakdown summary, general topics within the DMP topic, then UH Template questions. There are some generic examples and UH specific solutions.
More informationScientific Research Data Management Policy
Scientific Research Data Management Policy DOCUMENT SUMMARY Document No. SRDMP-0001 Ref. Document Title Author(s) Policy Sponsor Scientific Research Data Management Policy Karen Ambrose Alison Davis DOCUMENT
More informationWriting a Data Management Plan A guide for the perplexed
March 29, 2012 Writing a Data Management Plan A guide for the perplexed Agenda Rationale and Motivations for Data Management Plans Data and data structures Metadata and provenance Provisions for privacy,
More informationData Curation Profile Human Genomics
Data Curation Profile Human Genomics Profile Author Profile Author Institution Name Contact J. Carlson N. Brown Purdue University J. Carlson, jrcarlso@purdue.edu Date of Creation October 27, 2009 Date
More informationManaging Records in Electronic Formats. An Introduction
Managing Records in Electronic Formats An Introduction Jefferson County Public Schools Archives and Records Center November 2012 Managing Records in Electronic Format As we create and use more and more
More informationDeveloping Data Management Plans (DMP) Scholarly Communication Initiative Mississippi State University Libraries March 25, 2015
Developing Data Management Plans (DMP) Scholarly Communication Initiative Mississippi State University Libraries March 25, 2015 Overview What s new with data management? Why is the library involved with
More informationThe Data Curation Profiles Toolkit: Interview Worksheet
Purdue University Purdue e-pubs Data Curation Profiles Toolkit 11-29-2010 The Data Curation Profiles Toolkit: Interview Worksheet Jake Carlson Purdue University, jakecar@umich.edu Follow this and additional
More informationThis version has been archived. Find the current version at on the Current Documents page. Archived Version. Capture of Live Systems
Scientific Working Group on Digital Evidence Capture of Live Systems Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail
More informationApplying Archival Science to Digital Curation: Advocacy for the Archivist s Role in Implementing and Managing Trusted Digital Repositories
Purdue University Purdue e-pubs Libraries Faculty and Staff Presentations Purdue Libraries 2015 Applying Archival Science to Digital Curation: Advocacy for the Archivist s Role in Implementing and Managing
More informationData Management Plan Generic Template Zach S. Henderson Library
Data Management Plan Generic Template Zach S. Henderson Library Use this Template to prepare a generic data management plan (DMP). This template does not correspond to any particular grant funder s DMP
More informationProtecting Future Access Now Models for Preserving Locally Created Content
Protecting Future Access Now Models for Preserving Locally Created Content By Amy Kirchhoff Archive Service Product Manager, Portico, ITHAKA Amigos Online Conference Digital Preservation: What s Now, What
More informationFeed the Future Innovation Lab for Peanut (Peanut Innovation Lab) Data Management Plan Version:
Feed the Future Innovation Lab for Peanut (Peanut Innovation Lab) Data Management Plan Version: 20180316 Peanut Innovation Lab Management Entity The University of Georgia, Athens, Georgia Feed the Future
More informationImportance of cultural heritage:
Cultural heritage: Consists of tangible and intangible, natural and cultural, movable and immovable assets inherited from the past. Extremely valuable for the present and the future of communities. Access,
More informationThe library s role in promoting the sharing of scientific research data
The library s role in promoting the sharing of scientific research data Katherine Akers Biomedical Research/Research Data Specialist Shiffman Medical Library Wayne State University Funding agency requirements
More informationGramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.
Gramm Leach Bliley Act 15 U.S.C. 6801-6809 GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 11/30/2016 1 Objectives for GLBA Training GLBA Overview Safeguards Rule
More informationManagement: A Guide For Harvard Administrators
E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered
More informationData Curation Profile Cornell University, Biophysics
Data Curation Profile Cornell University, Biophysics Profile Author Dianne Dietrich Author s Institution Cornell University Contact dd388@cornell.edu Researcher(s) Interviewed Withheld Researcher s Institution
More informationUNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017
UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets
More informationHow to make your data open
How to make your data open Marialaura Vignocchi Alma Digital Library Muntimedia Center University of Bologna The bigger picture outside academia Thursday 29th October 2015 There is a strong societal demand
More informationData publication and discovery with Globus
Data publication and discovery with Globus Questions and comments to outreach@globus.org The Globus data publication and discovery services make it easy for institutions and projects to establish collections,
More informationORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers
All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision
More informationCriminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud
Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationNOW ON. Mike Takats Thomson Reuters April 30, 2013
NOW ON Mike Takats Thomson Reuters April 30, 2013 Thomson Reuters, ISI and the Web of Knowledge OVER 50 YEARS OF EXPERIENCE IN CITATION INDEXING, ANALYSIS AND METRICS In 1955, Dr. Eugene Garfield revolutionized
More informationSubject: University Information Technology Resource Security Policy: OUTDATED
Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from
More informationCollection Policy. Policy Number: PP1 April 2015
Policy Number: PP1 April 2015 Collection Policy The Digital Repository of Ireland is an interactive trusted digital repository for Ireland s contemporary and historical social and cultural data. The repository
More informationOracle MaxRep for SAN. Configuration Sizing Guide. Part Number E release November
Oracle MaxRep for SAN Configuration Sizing Guide Part Number E68489-01 release 1.0 2015 November Copyright 2005, 2015, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationSurvey of research data management practices at the University of Pretoria, South Africa: October 2009 March 2010
Survey of research data management practices at the University of Pretoria, South Africa: October 2009 March 2010 Undertaken by the Department of Library Services in order to improve research practices
More informationOpus: University of Bath Online Publication Store
Pink, C. and Cope, J. (2012) Managing Your Research Data (Presentation). UNSPECIFIED. (Unpublished) Link to official URL (if available): Opus: University of Bath Online Publication Store http://opus.bath.ac.uk/
More informationQueen s University Library. Research Data Management (RDM) Workflow
Queen s University Library Research Data Management (RDM) Workflow Alexandra Cooper Jeff Moon Data Services, Open Scholarship Services Queen s University Library February 2018 Table of Contents RDM Planning...
More informationThe Case of the 35 Gigabyte Digital Record: OCR and Digital Workflows
Florida International University FIU Digital Commons Works of the FIU Libraries FIU Libraries 8-14-2015 The Case of the 35 Gigabyte Digital Record: OCR and Digital Workflows Kelley F. Rowan Florida International
More informationThis presentation is on issues that span most every digitization project.
This presentation is on issues that span most every digitization project. 1 This presentation is based on this general lifecycle. While each project s workflow will differ in the details, any digitization
More informationReflections on Three Decades in Internet Time
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States of America License. Reflections on Three Decades in Internet Time Christine Borgman, Paul
More informationGuidelines for Depositors
UKCCSRC Data Archive 2015 Guidelines for Depositors The UKCCSRC Data and Information Life Cycle Rod Bowie, Maxine Akhurst, Mary Mowat UKCCSRC Data Archive November 2015 Table of Contents Table of Contents
More informationStandard for Security of Information Technology Resources
MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information
More informationIndiana University Research Technology and the Research Data Alliance
Indiana University Research Technology and the Research Data Alliance Rob Quick Manager High Throughput Computing Operations Officer - OSG and SWAMP Board Member - RDA Organizational Assembly RDA Mission
More informationre3data.org - Making research data repositories visible and discoverable
re3data.org - Making research data repositories visible and discoverable Robert Ulrich, Karlsruhe Institute of Technology Hans-Jürgen Goebelbecker, Karlsruhe Institute of Technology Frank Scholze, Karlsruhe
More informationDryad Curation Manual, Summer 2009
Sarah Carrier July 30, 2009 Introduction Dryad Curation Manual, Summer 2009 Dryad is being designed as a "catch-all" repository for numerical tables and all other kinds of published data that do not currently
More informationUT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES
ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary
More informationData Management Plans
Data Management Plans JENNIFER L. THOEGERSEN, DATA CURATION LIBRARIAN NURAMP WORKSHOP SERIES MARCH 17, 2016 Jenny Thoegersen, Data Curation Librarian University of Nebraska-Lincoln Libraries jthoegersen2@unl.edu
More informationEmployee Security Awareness Training Program
Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,
More informationManaging Born- Digital Documents.
Managing Born- Digital Documents www.archives.nysed.gov Objectives Review the challenges of managing born-digital records Provide Practical strategies to ensure born-digital records are well managed Understand
More informationWhere to store research data during and after a project. Dr. Chris Emmerson Research Data Manager
Where to store research data during and after a project Dr. Chris Emmerson Research Data Manager Welcome Research Data Service Data Lifecycle Data Storage Questions 1 Research Data Service 2 Research Data
More informationDURAFILE. D1.2 DURAFILE Technical Requirements
Project Title: INNOVATIVE DIGITAL PRESERVATION USING SOCIAL SEARCH IN AGENT ENVIRONMENTS This project has received funding from the European Union s Seventh Framework Programme for research, technological
More informationArchives in a Networked Information Society: The Problem of Sustainability in the Digital Information Environment
Archives in a Networked Information Society: The Problem of Sustainability in the Digital Information Environment Shigeo Sugimoto Research Center for Knowledge Communities Graduate School of Library, Information
More informationDigital Preservation: How to Plan
Digital Preservation: How to Plan Preservation Planning with Plato Christoph Becker Vienna University of Technology http://www.ifs.tuwien.ac.at/~becker Sofia, September 2009 Outline Why preservation planning?
More informationPaving the Rocky Road Toward Open and FAIR in the Field Sciences
Paving the Rocky Road Toward Open and FAIR Kerstin Lehnert Lamont-Doherty Earth Observatory, Columbia University IEDA (Interdisciplinary Earth Data Alliance), www.iedadata.org IGSN e.v., www.igsn.org Field
More informationResearch Data Management Procedures
Research Data Management Procedures INTRODUCTION The University is committed to providing a research environment that will promote a high standard of professional conduct by its researchers, and a culture
More informationSustainable Governance for Long-Term Stewardship of Earth Science Data
Sustainable Governance for Long-Term Stewardship of Earth Science Data Robert R. Downs and Robert S. Chen NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science
More informationMinnesota State Colleges and Universities System Procedures Chapter 5 Administration
Minnesota State Colleges and Universities System Procedures Chapter 5 Administration 5.25.1 Use of Electronic Part 1. Purpose. This procedure establishes requirements for the consistent, secure implementation
More informationChapter 9 Section 3. Digital Imaging (Scanned) And Electronic (Born-Digital) Records Process And Formats
Records Management (RM) Chapter 9 Section 3 Digital Imaging (Scanned) And Electronic (Born-Digital) Records Process And Formats Revision: 1.0 GENERAL 1.1 The success of a digitized document conversion
More informationRecords Management and Retention
Records Management and Retention Category: Governance Number: Audience: University employees and Board members Last Revised: January 29, 2017 Owner: Secretary to the Board Approved by: Board of Governors
More informationInge Van Nieuwerburgh OpenAIRE NOAD Belgium. Tools&Services. OpenAIRE EUDAT. can be reused under the CC BY license
Inge Van Nieuwerburgh OpenAIRE NOAD Belgium Tools&Services OpenAIRE EUDAT can be reused under the CC BY license Open Access Infrastructure for Research in Europe www.openaire.eu Research Data Services,
More informationSurvey of Research Data Management Practices at the University of Pretoria
Survey of Research Data Management Practices at the University of Pretoria Undertaken by the Department of Library Services in order to improve research practices at the University Unisa Library Open Access
More informationRPS Technology Standards Grades 9 through 12 Technology Standards and Expectations
RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations Throughout high school, as students take courses to prepare themselves for college and the working world, they should
More informationRPg procedures for Research Data Management (RDM)
RPg procedures for Research Data Management (RDM) HKUL Research Data services http://lib.hku.hk/researchdata/ HKUL Research Data services http://lib.hku.hk/researchdata/help.htm Why Research Data MANAGEMENT
More informationThe Ohio State University's Knowledge Bank: An Institutional Repository in Practice
The Ohio State University's Knowledge Bank: Maureen P. Walsh, The Ohio State University Libraries The Ohio State University s Institutional Repository Mission The mission of the institutional repository
More informationPDS, DOIs, and the Literature. Anne Raugh, University of Maryland Edwin Henneken, Harvard-Smithsonian Center for Astrophysics
PDS, DOIs, and the Literature Anne Raugh, University of Maryland Edwin Henneken, Harvard-Smithsonian Center for Astrophysics A Brief Introduction to DOIs History DOI = Digital Identifier for an Object
More informationOUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE
CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8
More informationSecure Messaging Mobile App Privacy Policy. Privacy Policy Highlights
Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review
More informationFair data and open data: differences and consequences
Fair data and open data: differences and consequences 1. To share or not to share: what is fair? Alex Burdorf, Erasmus MC Rotterdam 2. Data sharing: consequences for informed consent Marie-José Bonthuis,
More informationMercè Crosas, Ph.D. Chief Data Science and Technology Officer Institute for Quantitative Social Science (IQSS) Harvard
Mercè Crosas, Ph.D. Chief Data Science and Technology Officer Institute for Quantitative Social Science (IQSS) Harvard University @mercecrosas mercecrosas.com Open Research Cloud, May 11, 2017 Best Practices
More informationSouthington Public Schools
3543 POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION I.POLICY The Board of Education (the Board ) complies with all state and federal regulations regarding the retention, storage and destruction
More informationThe Need for a Terminology Bridge. May 2009
May 2009 Principal Author: Michael Peterson Supporting Authors: Bob Rogers Chief Strategy Advocate for the SNIA s Data Management Forum, CEO, Strategic Research Corporation and TechNexxus Chair of the
More informationDRI: Preservation Planning Case Study Getting Started in Digital Preservation Digital Preservation Coalition November 2013 Dublin, Ireland
DRI: Preservation Planning Case Study Getting Started in Digital Preservation Digital Preservation Coalition November 2013 Dublin, Ireland Dr Aileen O Carroll Policy Manager Digital Repository of Ireland
More informationISMTE Best Practices Around Data for Journals, and How to Follow Them" Brooks Hanson Director, Publications, AGU
ISMTE Best Practices Around Data for Journals, and How to Follow Them" Brooks Hanson Director, Publications, AGU bhanson@agu.org 1 Recent Alignment by Publishers, Repositories, and Funders Around Data
More informationSession Two: OAIS Model & Digital Curation Lifecycle Model
From the SelectedWorks of Group 4 SundbergVernonDhaliwal Winter January 19, 2016 Session Two: OAIS Model & Digital Curation Lifecycle Model Dr. Eun G Park Available at: https://works.bepress.com/group4-sundbergvernondhaliwal/10/
More informationDraft Digital Preservation Policy for IGNCA. Dr. Aditya Tripathi Banaras Hindu University Varanasi
Draft Digital Preservation Policy for IGNCA Dr. Aditya Tripathi Banaras Hindu University Varanasi aditya@bhu.ac.in adityatripathi@hotmail.com Digital Preservation Born Digital Object Regardless of U S
More informationIntégrité scientifique: Data Research Management
Intégrité scientifique: Data Research Management Definition of research data Research data are collected, observed or created, for the purposes of analysis to produce and validate original research results.
More informationLong-term digital preservation of UNSWorks
Long-term digital preservation of UNSWorks UNSW Library Arif Shaon, Maude Frances CAUL Community Days 2014 UNSW Australia The University of New South Wales at a Glance: https://www.unsw.edu.au/sites/default/files/documents/unsw4009_miniguide_2012_aw2_v2.pdf
More informationPrivacy and Security Update: What Clinical Researchers Must Know
Privacy and Security Update: What Clinical Researchers Must Know Megan Morash Chair of Partners Human Research Committee Sarah E. Jordan Privacy and Security Specialist Fabio Martins Research Information
More informationINFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES
INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using
More informationSustainable File Formats for Electronic Records A Guide for Government Agencies
Sustainable File Formats for Electronic Records A Guide for Government Agencies Electronic records are produced and kept in a wide variety of file formats, often dictated by the type of software used to
More informationPersistent Identifier the data publishing perspective. Sünje Dallmeier-Tiessen, CERN 1
Persistent Identifier the data publishing perspective Sünje Dallmeier-Tiessen, CERN 1 Agenda Data Publishing Specific Data Publishing Needs THOR Latest Examples/Solutions Publishing Centerpiece of research
More informationRed Flags/Identity Theft Prevention Policy: Purpose
Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and
More informationSHARING YOUR RESEARCH DATA VIA
SHARING YOUR RESEARCH DATA VIA SCHOLARBANK@NUS MEET OUR TEAM Gerrie Kow Head, Scholarly Communication NUS Libraries gerrie@nus.edu.sg Estella Ye Research Data Management Librarian NUS Libraries estella.ye@nus.edu.sg
More information1 Privacy Statement INDEX
INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related
More informationINFORMATION SECURITY AND RISK POLICY
INFORMATION SECURITY AND RISK POLICY 1 of 12 POLICY REFERENCE INFORMATION SHEET Document Title Document Reference Number Information Security and Risk Policy P/096/CO/03/11 Version Number V02.00 Status:
More informationStriving for efficiency
Ron Dekker Director CESSDA Striving for efficiency Realise the social data part of EOSC How to Get the Maximum from Research Data Prerequisites and Outcomes University of Tartu, 29 May 2018 Trends 1.Growing
More informationOpenAIRE. Fostering the social and technical links that enable Open Science in Europe and beyond
Alessia Bardi and Paolo Manghi, Institute of Information Science and Technologies CNR Katerina Iatropoulou, ATHENA, Iryna Kuchma and Gwen Franck, EIFL Pedro Príncipe, University of Minho OpenAIRE Fostering
More informationStrategy for long term preservation of material collected for the Netarchive by the Royal Library and the State and University Library 2014
Strategy for long term preservation of material collected for the Netarchive by the Royal Library and the State and University Library 2014 Introduction This document presents a strategy for long term
More informationPolicies & Regulations
Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major
More informationAn overview of the OAIS and Representation Information
An overview of the OAIS and Representation Information JORUM, DCC and JISC Forum Long-term Curation and Preservation of Learning Objects February 9 th 2006 University of Glasgow Manjula Patel UKOLN and
More informationThe Curator s Approach to Data Management and Sustainability
The Curator s Approach to Data Management and Sustainability Nic Weber & Megan Senseney Center for Informatics Research in Science & Scholarship Graduate School of Library & Information Science University
More informationData Management in the Digital Humanities
University of Massachusetts Amherst From the SelectedWorks of Thea P Atwood Spring February, 2013 Data Management in the Digital Humanities Thea P Atwood, University of Massachusetts Amherst Available
More informationOpen Access & Open Data in H2020
Open Access & Open Data in H2020 Services & Support Hannelore Vanhaverbeke, PhD Research Coordination Office What are you in for? Mandatory Each beneficiary must ensure open access (free of charge, online
More informationISO INTERNATIONAL STANDARD. Information and documentation Managing metadata for records Part 2: Conceptual and implementation issues
INTERNATIONAL STANDARD ISO 23081-2 First edition 2009-07-01 Information and documentation Managing metadata for records Part 2: Conceptual and implementation issues Information et documentation Gestion
More information