Advice, best practice and legal requirements on how best to manage the data you collect, store and share when working on a research or innovation project at Ïã¸ÛÁùºÏ²Ê.
On this pageÌý
- What is considered data?
- Research data management support
- Relevant legislation and Ïã¸ÛÁùºÏ²Ê data management policies
- Plan your data management strategy
- Writing a data management plan
- DMPonline
- Costing data management
- Data protection
- Reporting a data breach
- Training
- Intellectual Property
- Where to store your data
- Ïã¸ÛÁùºÏ²Ê Research Data Repository
- Sharing data
- Accessing NHS Data without consent
What is considered data?
Anything you generate during your project can be considered data. It includes but is not limited to:
- Software or code
- Spreadsheets
- Laboratory or field notebooks
- Questionnaires, test responses and models
- Audio or video files
- Historical or modern texts and photographs.
Research Data Management support
Ïã¸ÛÁùºÏ²Ê Library Services offerÌýessential information for the management of research data for the whole research lifecycle.ÌýThis includes adviceÌýon how to select, document, and store your data for the long term, as well as advice on managing research outputs and handling issues such as copyright and data protection.
The Ïã¸ÛÁùºÏ²Ê Research Integrity website has a wide range of advice, links to policy, areas to consider, and general questions to consider with all data.
The Ïã¸ÛÁùºÏ²ÊÌýLMIC toolkit can provide specific advice for research in low and middle-income countries (LMICs).
- Ïã¸ÛÁùºÏ²Ê LMIC ToolkitÌý(Ïã¸ÛÁùºÏ²Ê login required)
Relevant legislation and Ïã¸ÛÁùºÏ²Ê data management policies
All those involved with handling data should be aware of the relevant legislation and Ïã¸ÛÁùºÏ²Ê policies.
- Ïã¸ÛÁùºÏ²Ê Research Data PolicyÌý(pdf)
- Policies & funders' expectations
- Data Management and Protection advice
IfÌýyou are planning to transfer data outside of the European Economic Area (EEA), contact the Ïã¸ÛÁùºÏ²Ê Data Protection team at:Ìýdata-protection@ucl.ac.uk
Plan your data management strategy
Find help on how to plan yourÌýdata management strategyÌýon the Ïã¸ÛÁùºÏ²Ê Integrity website. TheyÌýprovideÌýlinks to policy, areas to consider, and generalÌýquestions to think about with all data.
Writing a data management plan
The Research Data Management team can help you write or review your Data Management planÌýand give you advice on how to select, document and store your data for the long term.
DMPonline
DMPonlineÌýis an online tool developed by the Digital Curation Centre that helps researchers develop Data Management Plans by providing templates for different funders and guidance at each step.
Costing data management
When you are applying for funding, costing all activities associated with data management is not only helpful but often necessary.Ìý
Data protection
Data protection is the fair and proper use of information about people. The Data Protection team haveÌýa wide range of resources available to help staff and students understandÌýdata protection legislation and how it is interpreted and implemented at Ïã¸ÛÁùºÏ²Ê.
Reporting a dataÌýbreach
If you become aware of a security-related issue where information could be accessed inappropriately, please report it. Find outÌýto report an incidentÌýon the Ïã¸ÛÁùºÏ²Ê Information Security website.
Training
Access data protection, intellectual property and data management trainingÌýat Ïã¸ÛÁùºÏ²Ê.Ìý
- Ïã¸ÛÁùºÏ²Ê Data Protection Online Training
- Understanding and protecting Intellectual Property (IP) at Ïã¸ÛÁùºÏ²Ê
- Research Data Management How-to Guides
- Ìý(Ïã¸ÛÁùºÏ²Ê login required)
Intellectual Property
Ïã¸ÛÁùºÏ²Ê’s Intellectual Property (IP) Policy sets out the principles of ownership/rights to use intellectual property generated by Ïã¸ÛÁùºÏ²Ê’s staff and students.
- Ïã¸ÛÁùºÏ²Ê Intellectual Property (IP) Policy
- Create a spinout or license your intellectual property (IP)
- Understanding and protecting intellectual property (IP) at Ïã¸ÛÁùºÏ²Ê: Online training
Where to store your data
Data storage and preservation are key parts of the research data lifecycle. You willÌýneed to determine which system willÌýbest meet your project’s requirements for confidentiality, integrity and availability.
If you’reÌýobtaining data under licence or contractÌý(usually via aÌýdata-sharing agreement) it’s likely there will be specific requirements for where this data can be stored. Data sharing agreements often include a requirement for secure data destruction.ÌýYou should check that the system you plan to use will be able to meet this requirement.
Library Services provide useful guidance on storing and preserving research data.
Research Data Storage Service
TheÌýResearch Data Storage Service is a centrally-managed, resilient data storage facility for Ïã¸ÛÁùºÏ²Ê researchers who need somewhere to store and share their research data during the active phase of a research project.
Data Safe Haven
The Data Safe Haven (DSH) provides a technical solution for storing, handling and analysing identifiable data. If you plan to handle personal data as part of your research project you shouldÌýuse the DSH. Before requesting access, you will need to complete theÌýInformation Governance assurance process.
Ïã¸ÛÁùºÏ²Ê Research Data Repository
Staff and research students can archive and preserve research outputs using the Ïã¸ÛÁùºÏ²Ê Research Data Repository.ÌýUse theÌýResearch Data Repository to publish your datasets, figures, posters, presentations, workflows, data management plans, media and models.
Sharing data
Research data often remainÌývaluable after the life of the research project for which it was generated.
There are many reasons to shareÌýresearch data.ÌýIt can increase the impact and visibility of your research,Ìýincrease your academic profile, and lead to new collaborations and partnerships.ÌýFunders are also increasingly requiring researchers to share their data.Ìý
YouÌýshould plan how and when to share your data (if it can be shared). Ïã¸ÛÁùºÏ²Ê Library Services provide useful guidance on how to share your research data and the potential benefits this brings.
Accessing NHS Data without consent
If you are applying for Section 251 for approval from the Confidentiality Advisory GroupÌý(CAG) to access NHS Data without consent, this requires compliance with NHS DigitalÌýData Security and Protection Toolkit (DSPT). The Data Safe Haven is Ïã¸ÛÁùºÏ²Ê’s only IT platform that complies with the DSPT.
Before requesting access to the Data Safe Haven you must complete theÌýInformation Governance assurance process.
Ìý