Describe any applicable factors affecting subsequent access, distribution, or reuse of scientific data related to:
Key institutional resource for this part of a DMS Plan:
The IU Research Data Management Plan Working Group has developed a tool to help researchers identify relevant constraints and considerations for sharing research data. That resource is available at https://forms.office.com/r/ssQjhtD9m3.
If your research project involves human participants, the data sharing practices described in the Informed Consent process and document must align with your DMS Plan. In general, you cannot share data unless the participants have consented. One exception is related to de-identified datasets, or datasets from which all identifiable information has been removed (see box below).
Privacy - In research, privacy relates to a participant's right to control the conditions under which they participate in a study. These often involve the timing, circumstances, and extent of their participation.
Confidentiality - In research, confidentiality relates to the agreements researchers make with participants about how information the participants agree to share about themselves will be collected, stored, analyzed, used, and reported.
Sharing a dataset that contains protected data elements (i.e., variables) either requires sharing via controlled access, for the dataset to be de-identified, or sometimes both. De-identification can be complex. Minimally, it begins with removing all data elements that are considered Personally Identifiable Information (PII). These 18 data elements (direct identifiers) are defined in the HIPAA regulation. IU uses the HIPAA definition for research purposes as well.
Datasets can also contain indirect identifiers, which are more complex to identify and remove. For instance, the combination of a person's age and birth location could enable them to be re-identified. The risk of deductive disclosure (of identity) varies depending on the data elements involved. For more information, see this overview from the ICPSR. Thus, de-identification of datasets that include indirect identifiers can require significant time and expertise. For example, transcripts of interviews are often shared via controlled access because de-identification is not possible or would compromise the usefulness of the dataset.
Controlled access generally describes a process by which potential re-users of a dataset can seek access for research purposes. In some cases, a Data Use Agreement (DUA) is required, while other situations are more appropriately handled by other types of agreements. For a list of the types of research agreements commonly used at IU, see https://research.iu.edu/awards-agreements/research-agreements/index.html.
Controlled access describes many specific processes. In contrast to openly or freely shared data, controlled access sharing involves a defined procedure for reviewing and approving the request. The procedure may be shaped by federal regulations, state law, and more. This type of sharing is common when the data to be shared cannot be de-identified, are deemed sensitive for other reasons, or when participants have consented only to controlled forms of sharing.
These agreements describe what the re-user is allowed to do with the data. Are they allowed to combine it with other data? Can they re-distribute the aggregated data set? How should they give credit to the original data source(s)? How long can they keep the data? Must the data be destroyed when the agreement period is over? And many more. The conditions provided in the agreement may be shaped by federal regulations, state law, and more.
If you are able to share a subset of the data from your project openly/publicly, it is strongly recommended that you choose a license to clearly communicate the rights of data re-users. In many cases, the data repository you select will have identified licenses that they support and can help you to choose an appropriate license. A helpful guide to open data licensing is available from the Open Knowledge Foundation.
In some cases, data is shared with specific permissions (or terms and conditions) for their use.
In many cases, these permissions or requirements are due to international, federal, and state regulations.
IU Libraries provide support for researchers seeking NIH-funding. We are actively monitoring updates and guidance available from the NIH, as well as the IU Research Data Management Plan Working Group. We will continue to update the information here to reflect those changes. Our support includes:
We will also connect you with other experts across IU who can help you submit the best DMS Plan possible. We are not able to write DMS Plans on behalf of research teams of which we are not members.
To request a consultation, contact the data librarian for your campus or school: