Skip to content

Commit

Permalink
Fix minor markdown lint issues
Browse files Browse the repository at this point in the history
  • Loading branch information
chartgerink committed Sep 4, 2024
1 parent 755f661 commit 39571e3
Show file tree
Hide file tree
Showing 2 changed files with 27 additions and 25 deletions.
44 changes: 22 additions & 22 deletions topics/data-protection.qmd
Original file line number Diff line number Diff line change
Expand Up @@ -8,40 +8,40 @@ The question for you as a researcher is 'when are the measures that you take sec

The University has a Security Baseline that sets a norm for levels of protection for every application it uses. The Baseline is based on international standards. For each of these applications, the University is considering for which means the security of these applications are adequate enough.

The legal requirements for the processing of personal data can be found in the section 'GDPR and Privacy' under \_Plan & Design\_ There are additional laws and regulations as well. The assumption is that you are familiar with these, especially with laws regulating medical and criminal research.
The legal requirements for the processing of personal data can be found in the section 'GDPR and Privacy' under [Plan & Design](../pathways/plan-and-design.qmd) There are additional laws and regulations as well. The assumption is that you are familiar with these, especially with laws regulating medical and criminal research.

What you personally consider to be secure might be very different from what your colleagues, the Faculty or the University considers to be secure enough and the norms will vary with the variety of data that is being processed by different researchers and Faculties of the VU. Very generally speaking, there are three points of protection to consider:

1. Protection against data loss, for which you need a back up periodically.
2. Protection against data leakage, for which you need to consider all storage places and their access points.
3. Protection of data integrity, for which you need version control and synchronisation management.
1. Protection against data loss, for which you need a back up periodically.
2. Protection against data leakage, for which you need to consider all storage places and their access points.
3. Protection of data integrity, for which you need version control and synchronisation management.

The security of your protection measures depends on the threat you face. We often think of threats as active, and motivated by bad intentions. But most common forms of data loss are accidental and most leakage is caused by trusting others. In reality, devices just get lost or break down, people download malware by accident, and each one of us forgets to save a document at times or gets confused about which version was last updated.

In all cases, protection starts with oversight on where your data is stored and processed. If you forget that you temporarily stored it in a certain place, you have then lost oversight of where that data is. The opposite is also true: if you know where you data is, you have insight in the level of security of the space in which you store it. As you can see, protection begins with organising your work in a reliable manner and thinking through your steps. 
In all cases, protection starts with oversight on where your data is stored and processed. If you forget that you temporarily stored it in a certain place, you have then lost oversight of where that data is. The opposite is also true: if you know where you data is, you have insight in the level of security of the space in which you store it. As you can see, protection begins with organising your work in a reliable manner and thinking through your steps.

For example, if you data is on your laptop and synchronised with your phone, then it is stored in two places. Perhaps this is enough back up, perhaps not. If you put both you devices in the same bag and you lose your bag, you have no backup. A backup to an online storage might be a good solution, but might also mean your data leaks via the internet of via the storage provider who sells the data and your behavioural data for profit. Most importantly, there is no absolute security. It is best if you consider your personal behaviour and then think of scenarios that are more or less likely to happen and what would impact you most. If you frequently work in public places you should make it a habit to lock your device each time you leave it. If you eat and drink behind your desk often, better work with a remote keyboard to protect your laptop from the unavoidable coffee shower. Do you save your respondents’ contact details on your personal phone? Then protect it with a pin.

Here are some basic protection guidelines:

1. Data are very difficult to erase. You have probably never done it.
2. Decide how to back up data and test it before you rely on it.
3. Do not give others your log-in credentials. If you have done so and your family members use your work device, then change it.
4. Do not use passwords twice, do not use your birthday, initials, streetname, hobby.
5. Encryption sounds secure, but it fails completely without good password management.

1. Data are very difficult to erase. You have probably never done it.
2. Decide how to back up data and test it before you rely on it.
3. Do not give others your log-in credentials. If you have done so and your family members use your work device, then change it.
4. Do not use passwords twice, do not use your birthday, initials, streetname, hobby.
5. Encryption sounds secure, but it fails completely without good password management.

### Data Protection

There can be many reasons why the data of a project needs to be kept protected:![](//libapps-eu.s3.amazonaws.com/accounts/46351/images/20130404encryption.jpg)
There can be many reasons why the data of a project needs to be kept protected:

* Sensitivity of the data collected
* Protection of the research data from competition
* Commercial reasons / Intellectual property
* Etc.
* Sensitivity of the data collected
* Protection of the research data from competition
* Commercial reasons / Intellectual property
* Etc.

There are also many levels of security that may be implemented, depending on the needs. Sometimes it will be enough to use a password-protected cloud-based server. In extreme cases encryption may be needed and also when data is transmitted between researchers or organisations. You should contact the [RDM Support Desk](mailto:rdm@vu.nl) to discuss available options, who may connect you to legal experts where sensitive data is concerned. Check the [Data Storage section of this LibGuide](http://libguides.vu.nl/rdm/data-storage) with links to find out more on campus solutions and cloud-based options.
![](https://libapps-eu.s3.amazonaws.com/accounts/46351/images/20130404encryption.jpg)

There are also many levels of security that may be implemented, depending on the needs. Sometimes it will be enough to use a password-protected cloud-based server. In extreme cases encryption may be needed and also when data is transmitted between researchers or organisations. You should contact the [RDM Support Desk](mailto:rdm@vu.nl) to discuss available options, who may connect you to legal experts where sensitive data is concerned. Check the [Data Storage section of this LibGuide](http://libguides.vu.nl/rdm/data-storage) with links to find out more on campus solutions and cloud-based options.

### Safe Transportation and Transfer

Expand All @@ -57,16 +57,16 @@ If data collection takes place through a certain measurement device (e.g. MRI sc

If you are doing fieldwork outside the campus and you have reliable and secure internet access, it is a good idea to upload the data to a storage location that is regularly backed up and secure, in order to prevent data loss. If you have a VUnetID, you can for example use:

* [SURFdrive](https://www.surf.nl/en/store-and-share-your-files-securely-in-the-cloud-with-surfdrive) to store your data in a secure cloud service
* [SURFfilesender](https://www.surf.nl/en/surffilesender-send-large-files-securely-and-encrypted) to send you data to a colleague or consortium partner, who can store your data in an appropriate place
* [SURFdrive](https://www.surf.nl/en/store-and-share-your-files-securely-in-the-cloud-with-surfdrive) to store your data in a secure cloud service
* [SURFfilesender](https://www.surf.nl/en/surffilesender-send-large-files-securely-and-encrypted) to send you data to a colleague or consortium partner, who can store your data in an appropriate place

You can find more information about each of these storage options on the [Data Storage](https://libguides.vu.nl/rdm/data-storage) page of this LibGuide.

If you need to receive data from colleagues in your project who don’t have access to these tools (e.g. because they are students, don’t work for a Dutch educational institution, or have no VUnetID), SURFdrive, SURFfilesender and Edugroepen can also be used:

* [SURFdrive](https://www.surf.nl/en/store-and-share-your-files-securely-in-the-cloud-with-surfdrive): you can set up a ‘File drop’ folder. By sharing the link of this folder to the researchers who need to upload documents, you enable them to do anonymous uploads to this folder. These users have solely upload rights, no view or download rights. The folder can be protected with a password, which you preferably share with the uploaders through another channel.
* [SURFfilesender](https://www.surf.nl/en/surffilesender-send-large-files-securely-and-encrypted): as a SURFfilesender user, you can send a voucher to someone who doesn’t have access to this tool. This person can use this voucher to send documents to you. These files can be encrypted.
* [](https://vu.nl/en/about-vu/more-about/off-campus-access)[Zivver i](https://services.vu.nl/esc?id=emp_taxonomy_topic&topic_id=01d4a69797cf09d0e553359fe153afdd)s an email plugin with which you can encrypt emails and attachments.
* [SURFdrive](https://www.surf.nl/en/store-and-share-your-files-securely-in-the-cloud-with-surfdrive): you can set up a ‘File drop’ folder. By sharing the link of this folder to the researchers who need to upload documents, you enable them to do anonymous uploads to this folder. These users have solely upload rights, no view or download rights. The folder can be protected with a password, which you preferably share with the uploaders through another channel.
* [SURFfilesender](https://www.surf.nl/en/surffilesender-send-large-files-securely-and-encrypted): as a SURFfilesender user, you can send a voucher to someone who doesn’t have access to this tool. This person can use this voucher to send documents to you. These files can be encrypted.
* [](https://vu.nl/en/about-vu/more-about/off-campus-access)[Zivver i](https://services.vu.nl/esc?id=emp_taxonomy_topic&topic_id=01d4a69797cf09d0e553359fe153afdd)s an email plugin with which you can encrypt emails and attachments.

##### Offline data outside campus

Expand Down
8 changes: 5 additions & 3 deletions topics/fair-principles.qmd
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ A lot of good resources exist already that explain the FAIR principles very well
- [The Turing Way](https://the-turing-way.netlify.app/reproducible-research/rdm/rdm-fair) has a great information page about FAIR, containing a lot of references to other useful sources
- The story [A FAIRy tale](https://zenodo.org/records/2248200) explains all principles in an understable way

The FAIR principles were rapidly adopted by Dutch and European funding agencies. If you receive a research grant from [NWO](https://www.nwo.nl/en/research-data-management), [ZonMw](https://www.zonmw.nl/en/everything-about-fair-data-management), or the [European Commission}(https://ec.europa.eu/info/funding-tenders/opportunities/docs/2021-2027/horizon/guidance/programme-guide_horizon_en.pdf), you will be asked to make your data FAIR.
The FAIR principles were rapidly adopted by Dutch and European funding agencies. If you receive a research grant from [NWO](https://www.nwo.nl/en/research-data-management), [ZonMw](https://www.zonmw.nl/en/everything-about-fair-data-management), or the [European Commission](https://ec.europa.eu/info/funding-tenders/opportunities/docs/2021-2027/horizon/guidance/programme-guide_horizon_en.pdf), you will be asked to make your data FAIR.

## How can you benefit from working in line with the FAIR principles?

Expand All @@ -27,17 +27,20 @@ Making your data FAIR will also make it possible for you to easily find, access
A DMP is a living document in which you specify what kinds of data you will use in your project, and how you will process, store and archive them. Preparing a data management plan should be your first step in the process to make data FAIR. The DMP template will ask questions that enable you to systematically address the things that need to be done to make your data FAIR. Writing a DMP [link to handbook page about DMPs] is also a requirement from funding agencies and some faculties at the VU. At the VU, you can use [DMPonline](https://dmponline.vu.nl/?perform_check=false) to create and share DMPs.

### Describe and document your data

To be findable, data need to be described with appropriate metadata. Metadata can include keywords, references to related papers, the researchers’ [ORCID identifiers](https://libguides.vu.nl/orcid), and the codes for the grants that supported the research. You will need to provide such metadata when you are uploading data to a repository (see below). You increase findability by filling out as many metadata fields as possible and by providing rich descriptions in terminology that is common in your field.

To be reusable, data need to be accompanied by documentation describing how the data was created, structured, processed, and so on. It is good practice to integrate writing documentation during the research process. It will be easier and take less time compared to when you try to do this at the end. Having documentation on the research process will also help you to redo parts of your data cleaning actions or data analysis if necessary.

If you have questions about metadata and documentation, contact the [RDM Support Desk](rdm@vu.nl) and we will be happy to help you and to provide advice.

### Make your data available through a trustworthy repository
If you choose a repository that: assigns a persistent identifier to both the data and the metadata; attaches metadata to the data according to standard metadata schemas; releases data with a license; and provides access to the data and metadata via an open and standard communication protocol (such as http) – then your data will meet many, if not most, of the FAIR principles.

If you choose a repository that: assigns a persistent identifier to both the data and the metadata; attaches metadata to the data according to standard metadata schemas; releases data with a license; and provides access to the data and metadata via an open and standard communication protocol (such as http) – then your data will meet many, if not most, of the FAIR principles.

The VU provides three repositories which meets all of these conditions:
[link to pages about repositories]

- [DataverseNL](https://dataverse.nl/dataverse/vuamsterdam)
- Yoda - [Yoda information page](https://yoda.vu.nl/site/) and [Yoda publication platform](https://commons.datacite.org/doi.org?query=client.uid:delft.vudata)
- [Open Science Framework](https://osf.io/institutions/vua) (OSF)
Expand All @@ -47,4 +50,3 @@ Costs for using these repositories for datasets up to 500 GB are covered by the
## What if I cannot share my data?

Data do not need to be open to be FAIR. The FAIR principles allow for controlled access, which can be important for certain types of data, such as personal data, medical data, competitive company data. The guiding principle is always that data should be as “as open as possible, as closed as necessary”. If data cannot be openly shared, because they are too sensitive, then “[the FAIR approach would be to make the metadata publicly available and provide information about the conditions for accessing the data itself.](https://www.nature.com/nature-index/news/what-scientists-need-to-know-about-fair-data)

0 comments on commit 39571e3

Please sign in to comment.