Data Management Lesley A. Brown Director of Proposal Development Data Management Take home message: Data Management = Data SHARING Data Management A Data Management Plan (DPM) outlines the procedures you will use to manage your data during your research and explains how you will share your data and research results after the completion of the research project. Creating a Data Management Plan • Review funding agency requirements. • Determine what type(s) of data will be produced (e.g., quantitative, qualitative, sensitive). • Determine metadata standards. • Determine protections for sensitive or classified data. Creating a Data Management Plan • Determine what policies will govern data sharing and reuse. • Determine how you will archive and preserve your data. What is Metadata? • Data about data. • Two types – Structural: data about the containers of data. – Descriptive: individual instances or the data content. • Metadata often includes information on the means of creating the data, purpose of the data, creator or author of the data, location on the computer network, and standards. NSF Data Management Plans • Required since 2011 for all NSF research proposals. • No more than 2 pages in length. • Describes how the proposal will conform to NSF’s Data Sharing Policy. NSF Data Management Plans An NSF DMP should include: • Types of data to be produced (including samples, physical collections, software). • Metadata standards to be used. • Policies for access and sharing (including provisions for privacy/intellectual property where necessary). • Policies and provisions for re-use. • Plans for archiving and ensuring long-term preservation. NIH Data Sharing Policy • Published in the NIH Guide on February 26, 2003. • Data should be made as widely and freely available as possible while safeguarding the privacy of participants, and protecting confidential and proprietary data. NIH Data Sharing Policy NIH Policy on data sharing applies: • To the sharing of final research data for research purposes. • To all types of research supported by NIH. • To applications seeking $500,000 or more in direct costs in any year through grants, cooperative agreements or contracts. NIH Data Sharing Plan • • • • • • An NIH Data Sharing Plan should include: Schedule for data sharing. Format of the final dataset. Documentation to be provided. Whether a data sharing agreement will be required. Mode of data sharing (website, data archive, data enclave). What Is a Data Enclave? • Provides a controlled, secure environment in which eligible researchers can perform analyses using restricted data resource. • Datasets that can’t be distributed to the general public (e.g., because of participant confidentiality concerns, third-party licensing or use agreements that prohibit redistribution, or national security considerations)can be accessed through a data enclave. Resources • UNC Charlotte Atkins Library. • http://guides.library.uncc.edu/datamanageme nt • Information on NEH, NSF and NIH policies. • Sample plans. • Link to DMP Tool at University of California Curation Center. • Links to funder requirements and templates. Resources • University of Minnesota Libraries. • https://www.lib.umn.edu/datamanagement/ DMP • Full collection of data management information, including examples in a variety of disciplines. Research & Economic Development Office of Grants and Contracts Administration • Data Security • Presented by Debbie Bolick • September 24, 2015 Data Security Data security • Means safeguarding data, from being lost, modified, or unauthorized access Monitoring • That responsible parties are compliant with security plans Termination • Disposition or Sanitization of Data What type of Data is being protected? • Defined personally identifiable information • Information that can be used to distinguish or track an individual’s identity such as name, SSN, or biometric information • Indirect identification • using information in conjunction with other data elements to reasonably infer the identity of a respondent such as a combination of gender, race, date of birth, geographic indicators, or other descriptors • Non-identifiable information • Tracking purposes CIPSEA • Confidential Information Protection and Statistical Efficiency Act of 2002 (CIPSEA), Implemented June 15, 2007 • Provides strong confidentiality protections for statistical information collections sponsored by or conducted by more than 70 Federal agencies • Establishes uniform policy across Federal agencies • Authorizes data sharing among specified agencies (Bureaus of Economic Analysis, Labor Statistics and Census) to include identifiable data • CIPSEA data may only be used for statistical purposes CIPSEA •Penalties for non-compliance •Class E felony with imprisonment of not more than five (5) years •Fine of not more than $250,000 CIPSEA Implementation Guidance • Harmonized principles and processes and set minimum standards • Utilized best practices for handling • Addressed intersection between CIPSEA and Privacy Act of 1974 for non-statistical uses Authority Federal agencies empowered to make determination about the sensitivity of their information used for statistical purposes under a pledge of confidentiality Applies to local and state governments collecting data for federal agencies Special procedures required for use of laptop computers, PDAs, zip drives, floppy disks, CDROMs or any other IT devices Minimum Standards • All persons with access understand his/her responsibility related to maintaining confidentiality of information • Monitoring procedures for collection and release • Evaluating the reason for and controlling access • Maintaining physical and information systems security • Required Training • Overview of protection procedures • Limit access to those with a “need to know” • Physical and information systems security procedures must be in place • Penalties Ensure Controls 311.9 Regulation Regarding Third Party Data Subject to Contractual Access Data Security at UNC Charlotte pursuant to Policy 311.9 Implemented February 2011 Policy for handling and safeguarding electronic third party data • Received from third parties • Subject to contractual access restrictions. Ensures that adequate precautions are implemented prior to receiving such data • Maintain the security and confidentiality of covered data; and • Protect against the unauthorized access or use of such records or information in ways that could violate the University’s agreements with third parties who supply such data. Initiate Request for Data? Data Security Officer) • First Point of Contact • Data Security Plan • Checklist • Data Use Agreement • Document Repository University • Submits to Agency Signatory Data Sponsor • Agency releases Data to PI Ongoing Monitoring • Signs Use Agreement • System of Record Signator y Unit Internal Audit • Random audits • Collaborative role Responsib le Party • PI (Lead Custodian) cannot be a student • Authorizes Updates and monitor • Students • Research staff Information Security • College Data Security Officer • Central IT DSO list Data Security Officers Effective April 2015 Charles Andrews ......Metropolitan Studies and Extended Academic Programs William Ardern .........William States Lee College of Engineering Brian Bard ................Student Health Center Tim Carmichael ........Belk College of Business Alex Chapin ..............College of Liberal Arts & Sciences Rose Diaz .................College of Arts + Architecture Dane Hughes ............College of Education Joe Matesich .............College of Computing and Informatics Michael Moore ...........College of Health and Human Service Resources College Data Security Officers http://itservices.uncc.edu/home/it-policies-standards/data-security-officers IT Policies & Standards http://itservices.uncc.edu/home/it-policies-standards Security Awareness Training http://itservices.uncc.edu/home/information-security/information-assurance/security-awareness-training Human Subjects (IRB) http://research.uncc.edu/departments/office-research-compliance-orc/humansubjects Checklist & Data Security Plan http://research.uncc.edu/departments/office-research-compliance-orc/human-subjects/3rd-partydata-requirements QUESTIONS?