As said in Tampere higher education community's Open Science and Research policy, research data related to research results is by default open and meant for cooperative use. However, confidentiality should not be compromised, and hence, sharing and opening your data should follow the principle: as open as possible, as closed as necessary. When closing a project, evaluate which materials should be preserved and for how long and which materials should be disposed of permanently. There are several benefits to open your data
There are different ways to open your data. Your preference may depend on the customs in your discipline or on the expectations of your funder. Some publishers also has requirements for the length of time for preservation regarding data related to a publication.
It's also recommended that source code be shared and distributed where it is most appropriate, as determined by funding and other factors. Read more about opening your codes and softwares.
Data with personal information can only be published anonymised, when it is no longer subject to data protection legislation. Pseudonymised data is still personal data and cannot be opened without explicit consent for that purpose.
In some cases, personal information can be shared, if the original processing purpose allows it. However, if the original consent form does not refer to the further use of the data, opening the dataset may require requesting new consent from the data subjects. If you plan to share data which includes personal information, please contact firstname.lastname@example.org.
Please remember that you should still be able to open the metadata of the data holding personal information, although the actual data cannot be.
The aim of long-term preservation is to keep data usable and comprehensible for tens or even hundreds of years. If your data has a long term value, consider following:
The Ministry of Education and Culture is developing a service for the long-term preservation of valuable research data (Digital Preservation Service for Research Data, Fairdata-PAS). Tampere University has determined the process for identifying research data that will retain its value for a longer period and transferring it to the service. If you think your data will be suitable for Fairdata-PAS, contact email@example.com.
Traditionally, it has been recommended to destroy all sensitive data after the research project has ended, as storing it is risky and requires special arrangements. However, depending on research permits, datasets containing sensitive personal data may also be stored in the Fairdata-PAS service. What is important, is that research participants must be informed about preservation of data and the basis of the duration of preservation.
Archiving datasets that contain sensitive personal data requires a storage permit from the National Archives of Finland. The data must be minimised before storage. The further processing of such data requires a research permit.
Data citation gives credits to a data creator and facilitates tracking the usage and impact of the data. The researcher's position as the creator or collector of research data can be acknowledged by accordingly citing research data. Data citation practices are guided by copyright laws, data archive guidelines and the general rules of the scientific community.
Data storage services have their own general guidelines on how to cite data. Additionally, individual datasets may have citation guides. If there are no specific citation guidelines, data should be cited just like any other publication. Crosscite is a tool that helps you format your data citation.
The list consists of well known data repositories. Many of the services accept any kind of data types and files, but some of them are specialised in specific data. If you don't have any established repository in your field, use of these services is highly recommended.
Photo by Pixabay
Deleting and emptying the recycle bin containing the deleted files is not an irreversible way to destroy unnecessary data. Deleted data can be recovered even after reformatting the hard disk. Use special file deletion software in order to overwrite the data or demagnetise the hard disk. Storage devices can also be mechanically crushed into an unreadable state.
Photo by pxhere. CC0 Public domain.