Research Data Management and Security
Data Management
Data sharing allows for reproducibility, transparency, and data re-use in research. Sharing is easier if data are managed well from the start of a project.
Creating a Data Management Plan
A data management plan (DMP) is document describing how a you plan to manage data during your research and after your research project is completed, including how it will be organized, maintained, and shared.
Creating a DMP will help you to properly manage your data for your own use, fulfill your sponsor’s requirements, and make the data accessible for future use.
Your DMP will describe the structure and nature of the data as well as the activities and technical requirements to gather, merge, transfer, organize, document, analyze and preserve research data.
Data Plan Fundamentals
Funders may require specific DMP components and standards and formats will vary between academic disciplines but all data management plans will address common fundamental elements:
- Types of data to be produced by the research
- Data format and metadata standards
- Provisions for access and sharing of data
- How data may be reused or redistributed
- Data archiving and preservation
- Transition or termination of the data collection in the long-term future
- Budgeting for the above
Using the Data Management Planning Tool
To aid researchers in creating effective data management plans (DMPs), the University of California Curation Center collaborated with major research institutions on the development of the DMPTool, an online application to help researchers create data management plans.
DMPTool provides you detailed guidance and links to data management resources and takes you step by step through the process of generating a comprehensive plan tailored to your funder’s specific requirements. Because Texas State is a DMPTool Partner Institution, you’ll be able to log into DMPTool.org using your Texas State NetID and password.
Data Management Plan Resources
-
Specific Funder Requirements
-
General Best Practices
-
Metadata
- DMPTool.org Metadata Introduction
- Metadata Standards List
- BioSharing.org MIBBI Project
- ICPSR Social Science Metadata
- Federal Geographic Data Committee Geospatial Metadata
- USGS Metadata
- Agriculture Metadata Element Set (AGMES)
- Astronomy Visualization MetadataDisciplinary and Inter-Disciplinary Metadata Standards
-
Sharing and Archiving
-
Data Storage and Security
If you are a Principle Investigator and other research personnel responsible for the security of data related to or resulting from your funded or unfunded research, your practices must be in compliance with all Texas State IT Security policies, standards, and guidance at all times. Because Investigators may also be required to fulfill specific data security requirements set by federal funders and other research sponsors, you should take care to thoroughly understand such requirements.
Assistance during Proposal Submission or Prior to Grant Set Up
f you have questions related to how best to carry out your funder’s data security requirements within the Texas State IT environment, please use the Research Governance and Security Referral Form to contact Infosecurity. Use of the form is particularly critical if you need IT Security assistance during proposal submission preparation or prior to setting up a grant account.
Data Use Agreements
Any proposal, contract, agreement, terms and conditions document, purchase, or other transaction that commits Texas State University to specific terms, conditions, actions, standards, or requirements related to any type data security requirement related to research (funded or unfunded), must approved by, and may only be signed by, Dr. Blanda (unless the approval and/or signature is required to be provided by the Vice President of Information Technology, their designee, the Director of Purchasing, or their designee). Any such agreements related to data from funded or unfunded research will not be approved or signed unless an IT security assessment has been completed.
Research Data Security Form
Investigators must submit the Research Data Security Form to schedule an initial assessment with IT Security. IT Security personnel will schedule a subsequent onsite consultation.
An IT security assessment prior to proposal submission or finalization of a contract is a mandatory requirement for any proposal, plan, contract, or agreement that contains specific requirements for data security. Examples of such requirements include, but are not limited to, data storage, data transfer, data re-use, restricted access, training, network, software or hardware requirements.
-
Budgeting
-
Open access publication