SlideShare une entreprise Scribd logo
1  sur  10
Open data: Who decides?
Dave Berry, Enterprise Architect
Requesting information
Personal
information
Courses and
Programmes
Buildings &
Timetable
Research
data
Schools
Journalists
Researchers
Scammers
Data governance
• Policy
• Confidentiality
• Openness
• Data Stewards
• Ensuring security;
• Managing access;
• Documentation;
• Assuring quality
Policy
PeopleProcess
Two worlds
• Security and Control • Openness & Sharing
Policy: confidentiality
Unrestricted Published (e.g. the web site)
Open licence
Anything covered by FOI
Information we want to make public, or
don’t mind becoming public, including
everything under FOI
Restricted Personal (Data Protection)
Financial
Security
The “normal” level for information that
needs to be kept securely.
Confidential Sensitive personal (Data Protection)
Passwords
Exam papers (before the exam)
Medical
Commercial in confidence
ISO 27001
Information that requires extra security
controls of some sort.
Who decides?
• Policy to be decided ;-)
• But let’s conjecture…
• The data steward specifies the confidentiality level
• Down to the attribute level, if necessary
• Also by population, if necessary
• Assisted by Enterprise Architecture
• CISO and Records Management review this
• Data Steward approves release
• Ensures that data is documented
“Security & Control” world
RequestorData Steward
Data
Definition
Publishes Reads
Standard
Request
Form
CompletesSubmits
Log of
Requestors
Maintains
Approves
Data
AccessesMaintains
“Openness & Sharing” world
RequestorData Steward
Data
Definition
Publishes ReadsLog of
Requestors
Maintains?
Accesses
Standard
Request
Form
Completes?Reads?
Licenses
Data
Maintains?
(Highly provisional) protocol for requesting
access to unrestricted data
• The data must not be modified, amended or altered. Any data
changes must be actioned within the Golden Copy.
• Describe what the data will be used for and by whom it will be used.
• Nominate an individual responsible for the receiving system and the
data it contains.
• Declare if the data will be supplied to any other system.
• Define a retention schedule for the data in this system and confirm
that the data will be permanently deleted when no longer needed.
Questions for the open community
• Does the data need to be kept up to date?
• How should errors be reported?
• What if someone modifies the data set and re-releases it?
• E.g. reputational damage
• Can we track who is using the data?
• And what they are using it for?

Contenu connexe

Tendances

A Revolution in Open Science: Open Data and the Role of Libraries (Professor ...
A Revolution in Open Science: Open Data and the Role of Libraries (Professor ...A Revolution in Open Science: Open Data and the Role of Libraries (Professor ...
A Revolution in Open Science: Open Data and the Role of Libraries (Professor ...
LIBER Europe
 

Tendances (20)

SC2 Workshop 2: GODAN Action Project
SC2 Workshop 2: GODAN Action ProjectSC2 Workshop 2: GODAN Action Project
SC2 Workshop 2: GODAN Action Project
 
Research data management at UAL
Research data management at UALResearch data management at UAL
Research data management at UAL
 
An RDM Service for Health Researchers: LSHTM Case Study
An RDM Service for Health Researchers: LSHTM Case StudyAn RDM Service for Health Researchers: LSHTM Case Study
An RDM Service for Health Researchers: LSHTM Case Study
 
What does open science mean? A stakeholder perspective
What does open science mean? A stakeholder perspectiveWhat does open science mean? A stakeholder perspective
What does open science mean? A stakeholder perspective
 
UKSG Conference 2016 Breakout Session - figshare in the wild – university cas...
UKSG Conference 2016 Breakout Session - figshare in the wild – university cas...UKSG Conference 2016 Breakout Session - figshare in the wild – university cas...
UKSG Conference 2016 Breakout Session - figshare in the wild – university cas...
 
Open access to research data
Open access to research dataOpen access to research data
Open access to research data
 
Lessons in Open Access Compliance for Higher Education (LOCH)
Lessons in Open Access Compliance for Higher Education (LOCH)Lessons in Open Access Compliance for Higher Education (LOCH)
Lessons in Open Access Compliance for Higher Education (LOCH)
 
UKSG Conference 2016 Breakout Session - Putting users first with open source ...
UKSG Conference 2016 Breakout Session - Putting users first with open source ...UKSG Conference 2016 Breakout Session - Putting users first with open source ...
UKSG Conference 2016 Breakout Session - Putting users first with open source ...
 
Supporting Research Data Management in UK Universities: the Jisc Managing Res...
Supporting Research Data Management in UK Universities: the Jisc Managing Res...Supporting Research Data Management in UK Universities: the Jisc Managing Res...
Supporting Research Data Management in UK Universities: the Jisc Managing Res...
 
A Revolution in Open Science: Open Data and the Role of Libraries (Professor ...
A Revolution in Open Science: Open Data and the Role of Libraries (Professor ...A Revolution in Open Science: Open Data and the Role of Libraries (Professor ...
A Revolution in Open Science: Open Data and the Role of Libraries (Professor ...
 
Research Data Management Initiatives at the University of Edinburgh
Research Data Management Initiatives at the University of EdinburghResearch Data Management Initiatives at the University of Edinburgh
Research Data Management Initiatives at the University of Edinburgh
 
Grampian safe haven, research data network
Grampian safe haven, research data networkGrampian safe haven, research data network
Grampian safe haven, research data network
 
SC2 Workshop 2: The European Open Science Cloud
SC2 Workshop 2: The European Open Science CloudSC2 Workshop 2: The European Open Science Cloud
SC2 Workshop 2: The European Open Science Cloud
 
RDM at UEL: agile, fragile or feral?
RDM at UEL: agile, fragile or feral?RDM at UEL: agile, fragile or feral?
RDM at UEL: agile, fragile or feral?
 
Research Data Management at The University of Edinburgh
Research Data Management at The University of EdinburghResearch Data Management at The University of Edinburgh
Research Data Management at The University of Edinburgh
 
Infrastructure requirements for open scholarship – Jisc and CNI conference 10...
Infrastructure requirements for open scholarship – Jisc and CNI conference 10...Infrastructure requirements for open scholarship – Jisc and CNI conference 10...
Infrastructure requirements for open scholarship – Jisc and CNI conference 10...
 
International scholarly infrastructures
International scholarly infrastructuresInternational scholarly infrastructures
International scholarly infrastructures
 
Research Data Management Training and Support
Research Data Management Training and SupportResearch Data Management Training and Support
Research Data Management Training and Support
 
HESA data, describing research activity and #REF2021
HESA data, describing research activity and #REF2021HESA data, describing research activity and #REF2021
HESA data, describing research activity and #REF2021
 
How Elns can galvanise research data management.
How Elns can galvanise research data management. How Elns can galvanise research data management.
How Elns can galvanise research data management.
 

En vedette

En vedette (8)

Open data in the global south
Open data in the global southOpen data in the global south
Open data in the global south
 
Open Content / Open Collections
Open Content / Open CollectionsOpen Content / Open Collections
Open Content / Open Collections
 
Cityscope data features
Cityscope data featuresCityscope data features
Cityscope data features
 
Open Educational Resources (OER) Policy at the University of Edinburgh
Open Educational Resources (OER) Policy at the University of EdinburghOpen Educational Resources (OER) Policy at the University of Edinburgh
Open Educational Resources (OER) Policy at the University of Edinburgh
 
We are not in a post facts world
We are not in a post facts worldWe are not in a post facts world
We are not in a post facts world
 
Building Student Capital Through Student-Led Outreach, Engagement and Learnin...
Building Student Capital Through Student-Led Outreach, Engagement and Learnin...Building Student Capital Through Student-Led Outreach, Engagement and Learnin...
Building Student Capital Through Student-Led Outreach, Engagement and Learnin...
 
Citizen science for community development
Citizen science for community developmentCitizen science for community development
Citizen science for community development
 
Open Education and Co-creation
Open Education and Co-creationOpen Education and Co-creation
Open Education and Co-creation
 

Similaire à Open data who decides?

Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
Nicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
Nicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
Nicholas Davis
 
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DevOps.com
 

Similaire à Open data who decides? (20)

CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
 
The art of depositing social science data: maximising quality and ensuring go...
The art of depositing social science data: maximising quality and ensuring go...The art of depositing social science data: maximising quality and ensuring go...
The art of depositing social science data: maximising quality and ensuring go...
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Privacera and Northwestern Mutual - Scaling Privacy in a Spark Ecosystem
Privacera and Northwestern Mutual  - Scaling Privacy in a Spark EcosystemPrivacera and Northwestern Mutual  - Scaling Privacy in a Spark Ecosystem
Privacera and Northwestern Mutual - Scaling Privacy in a Spark Ecosystem
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.ppt
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
Increasing transparency in Medical Education through Open Data
Increasing transparency in Medical Education through Open Data Increasing transparency in Medical Education through Open Data
Increasing transparency in Medical Education through Open Data
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Publishing and sharing sensitive data 28 June
Publishing and sharing sensitive data 28 JunePublishing and sharing sensitive data 28 June
Publishing and sharing sensitive data 28 June
 
Scaling Privacy in a Spark Ecosystem
Scaling Privacy in a Spark EcosystemScaling Privacy in a Spark Ecosystem
Scaling Privacy in a Spark Ecosystem
 
Workshop - finding and accessing data - Cambridge August 22 2016
Workshop - finding and accessing data - Cambridge August 22 2016Workshop - finding and accessing data - Cambridge August 22 2016
Workshop - finding and accessing data - Cambridge August 22 2016
 
Create a Compliance Strategy for Office 365
Create a Compliance Strategy for Office 365Create a Compliance Strategy for Office 365
Create a Compliance Strategy for Office 365
 
Writing a successful data management plan with the DMPTool
Writing a successful data management plan with the DMPToolWriting a successful data management plan with the DMPTool
Writing a successful data management plan with the DMPTool
 
Transform Your Downstream Cloud Analytics with Data Quality 
Transform Your Downstream Cloud Analytics with Data Quality Transform Your Downstream Cloud Analytics with Data Quality 
Transform Your Downstream Cloud Analytics with Data Quality 
 
Data governance guide
Data governance guideData governance guide
Data governance guide
 
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
 

Plus de Lorna Campbell

Plus de Lorna Campbell (20)

Empowering Student Engagement with Open Education
Empowering Student Engagement with Open EducationEmpowering Student Engagement with Open Education
Empowering Student Engagement with Open Education
 
Fundamentals of Music Theory: Co-creating sustainable open textbooks for musi...
Fundamentals of Music Theory: Co-creating sustainable open textbooks for musi...Fundamentals of Music Theory: Co-creating sustainable open textbooks for musi...
Fundamentals of Music Theory: Co-creating sustainable open textbooks for musi...
 
Open eTextbooks for Access to Music Education: Outputs and Reflections
Open eTextbooks for Access to Music Education: Outputs and ReflectionsOpen eTextbooks for Access to Music Education: Outputs and Reflections
Open eTextbooks for Access to Music Education: Outputs and Reflections
 
Knowledge Activism: Representing HIV & AIDS activism on Wikipedia
Knowledge Activism: Representing HIV & AIDS activism on WikipediaKnowledge Activism: Representing HIV & AIDS activism on Wikipedia
Knowledge Activism: Representing HIV & AIDS activism on Wikipedia
 
The Scale of Open: Re-purposing open resources for music education 
The Scale of Open: Re-purposing open resources for music education The Scale of Open: Re-purposing open resources for music education 
The Scale of Open: Re-purposing open resources for music education 
 
Opened To All: OER as infrastructure at the University of Edinburgh
Opened To All: OER as infrastructure at the University of Edinburgh Opened To All: OER as infrastructure at the University of Edinburgh
Opened To All: OER as infrastructure at the University of Edinburgh
 
For the Common Good: Responding to the global pandemic with OER
For the Common Good: Responding to the global pandemic with OER For the Common Good: Responding to the global pandemic with OER
For the Common Good: Responding to the global pandemic with OER
 
Creative Commons Quick Start: A short introduction to using CC licences
Creative Commons Quick Start: A short introduction to using CC licencesCreative Commons Quick Start: A short introduction to using CC licences
Creative Commons Quick Start: A short introduction to using CC licences
 
Open knowledge in the Curriculum: Building competencies, attributes and liter...
Open knowledge in the Curriculum: Building competencies, attributes and liter...Open knowledge in the Curriculum: Building competencies, attributes and liter...
Open knowledge in the Curriculum: Building competencies, attributes and liter...
 
Get Blogging!
Get Blogging! Get Blogging!
Get Blogging!
 
Drawing the Line: Reflections on Ope Practice and Digital Labour
Drawing the Line: Reflections on Ope Practice and Digital LabourDrawing the Line: Reflections on Ope Practice and Digital Labour
Drawing the Line: Reflections on Ope Practice and Digital Labour
 
A Common Purpose: Wikimedia, Open Education and Knowledge Equity for all Intr...
A Common Purpose: Wikimedia, Open Education and Knowledge Equity for all Intr...A Common Purpose: Wikimedia, Open Education and Knowledge Equity for all Intr...
A Common Purpose: Wikimedia, Open Education and Knowledge Equity for all Intr...
 
Into the Open: Exploring the benefits of open education and OER
Into the Open: Exploring the benefits of open education and OERInto the Open: Exploring the benefits of open education and OER
Into the Open: Exploring the benefits of open education and OER
 
Introduction to Academic Blogging
Introduction to Academic BloggingIntroduction to Academic Blogging
Introduction to Academic Blogging
 
Influential Voices - Developing a blogging service based on trust and openness
Influential Voices - Developing a blogging service based on trust and opennessInfluential Voices - Developing a blogging service based on trust and openness
Influential Voices - Developing a blogging service based on trust and openness
 
Why Blog?
Why Blog? Why Blog?
Why Blog?
 
Opening Online Learning with OER
Opening Online Learning with OEROpening Online Learning with OER
Opening Online Learning with OER
 
Benefits of Professional Blogging
Benefits of Professional BloggingBenefits of Professional Blogging
Benefits of Professional Blogging
 
Positioning the values and practices of open education at the core of Univers...
Positioning the values and practices of open education at the core of Univers...Positioning the values and practices of open education at the core of Univers...
Positioning the values and practices of open education at the core of Univers...
 
Open.Ed - Supporting Open Education at the University of Edinburgh
Open.Ed -  Supporting Open Education at the University of EdinburghOpen.Ed -  Supporting Open Education at the University of Edinburgh
Open.Ed - Supporting Open Education at the University of Edinburgh
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Open data who decides?

  • 1. Open data: Who decides? Dave Berry, Enterprise Architect
  • 2. Requesting information Personal information Courses and Programmes Buildings & Timetable Research data Schools Journalists Researchers Scammers
  • 3. Data governance • Policy • Confidentiality • Openness • Data Stewards • Ensuring security; • Managing access; • Documentation; • Assuring quality Policy PeopleProcess
  • 4. Two worlds • Security and Control • Openness & Sharing
  • 5. Policy: confidentiality Unrestricted Published (e.g. the web site) Open licence Anything covered by FOI Information we want to make public, or don’t mind becoming public, including everything under FOI Restricted Personal (Data Protection) Financial Security The “normal” level for information that needs to be kept securely. Confidential Sensitive personal (Data Protection) Passwords Exam papers (before the exam) Medical Commercial in confidence ISO 27001 Information that requires extra security controls of some sort.
  • 6. Who decides? • Policy to be decided ;-) • But let’s conjecture… • The data steward specifies the confidentiality level • Down to the attribute level, if necessary • Also by population, if necessary • Assisted by Enterprise Architecture • CISO and Records Management review this • Data Steward approves release • Ensures that data is documented
  • 7. “Security & Control” world RequestorData Steward Data Definition Publishes Reads Standard Request Form CompletesSubmits Log of Requestors Maintains Approves Data AccessesMaintains
  • 8. “Openness & Sharing” world RequestorData Steward Data Definition Publishes ReadsLog of Requestors Maintains? Accesses Standard Request Form Completes?Reads? Licenses Data Maintains?
  • 9. (Highly provisional) protocol for requesting access to unrestricted data • The data must not be modified, amended or altered. Any data changes must be actioned within the Golden Copy. • Describe what the data will be used for and by whom it will be used. • Nominate an individual responsible for the receiving system and the data it contains. • Declare if the data will be supplied to any other system. • Define a retention schedule for the data in this system and confirm that the data will be permanently deleted when no longer needed.
  • 10. Questions for the open community • Does the data need to be kept up to date? • How should errors be reported? • What if someone modifies the data set and re-releases it? • E.g. reputational damage • Can we track who is using the data? • And what they are using it for?

Notes de l'éditeur

  1. I’m concerned with the University’s data – primarily the “corporate” or “enterprise” data, but some of the concerns carry over to research data too. Suppose someone would like access to some data. Or that someone wants to package up some data and give it to somebody else. Are they allowed to? To what extent is the data up to date and accurate? What does the data represent? What does it mean? Will the person requesting it understand it? We want a process that is readily available, easy to use, transparent, and auditable.
  2. Confidentiality – in progress by CISO Openness – OER policy is nearest to this Data Stewards – approach agreed by CMG
  3. Responsive to requests Centrally defined process for handling requests and providing access Mechanism for handling queries about the data
  4. Proactive Process to agree licence Define update policy? Central mechanism for publishing data? No support for queries?