SlideShare une entreprise Scribd logo
1  sur  18
Towards Privacy By Design
Key issues to unlock science.
Symposium: Designing and Shaping Open Science
Amsterdam, April 5 2016
Marlon Domingus
1. Attitude and Trust
2. The Researcher
3. Maturity Models as Time Machines
4. New Roles and Collaborations
5. Context and Framing
Key issues
Attitude
Source: https://cybersponse.com/data-breaches-by-the-numbers
Trust
Responsible Research and Innovation
Good Citizenship
Corporate Social Responsibility
Soft Law:
Code of
Conduct,
Guidelines,
...
Hard Law:
Privacy Law,
Patent Law,
…
Hard Law:
Contracts,
Agreements,
...
The researcher in context
European Code of Conduct
National Code of Conduct
University Policy
- Research Integrity
- Open Access, RDM
Discipline Specific
Code of Conduct
The researcher in context: soft law
European Funding Requirements
National Funding Requirements
University Requirements
The researcher in context: requirements
University A, Country A
T1: researcher works at University A, co-operates with University B and C
University B, Country A
collaboration University C, Country B
collaboration
The researcher (& infrastructure) in context
University A, Country A
University B, Country A
University C, Country Bcollaboration
collaboration
T2: researcher works at University B, co-operates with University C, D and E
T3: …
collaboration
The researcher (& infrastructure) in context
Researcher Mobility
Responsible Research and Innovation
Good Citizenship
Corporate Social Responsibility
Legal and Moral Requirements
Research Cycle
Transparency, Guidelines, Services, Infra, …
The researcher in context
Source: https://www.monash.edu/__data/assets/pdf_file/0010/385309/sensitive-decision-tree.pdf
Example
11
12
It took some time and effort,
but now we have Open Access and Open Science.
How did we get here?
2020 Hindsight
Legal Research Support Maturity Model
Level 1 Level 2 Level 3 Level 4 Level 5
Initial Development Defined Managed Optimised
Process is disorganised
& ad hoc
Process is under development Process is standardised,
communicated
Process is managed, measured Focus is on continuous
improvement
Institutional policies
& procedures
Policies & procedures may be
undeveloped, not up to date,
and/or inconsistent.
Policies & procedures are
developed & harmonised. Basic
understanding of the gaps in
the policies & guidelines.
Policies & procedures are
promulgated & absorbed into
behaviours.
Policies & procedures accepted as
part of the culture & subject to
audit.
Policies & procedures are
subject to review &
improvement.
Legal Research
Support
Legal support services are disorganised,
research contracts and agreements are
legally ad hoc supported, inconsistent and
poorly publicised.
Investment in legal expertise.
Legal services identified &
staffed. Responsibilities are
defined. Documentation &
awareness programs
developed.
Co-operation between legal
experts & widespread
availability of well documented
services. Common knowledge
available of all relevant legal
research support topics.
Widespread take up of legal
services at an early stage in the
research project. IPR and Privacy
are acknowledged as critical to
the institutional mission.
Researcher’s feedback,
research project’s lessons
learned as well as analysis of
awarded grant are used to
update & improve legal
research support services.
IT infrastructure IT infrastructure provision is patchy,
disorganised & poorly publicised &
not supporting the whole research cycle.
Funds are invested in
technology & skills.
Responsibilities are defined.
Processes are established,
defined & documented.
Awareness of the different IT
infra needs during the research
cycle.
Management shows active
support. Facilities are well
defined & communicated,
standardised & integrated. The
main aspects of the research
cycle are supported in the IT
infra. Key privacy aspects are
secured in the IT infra.
Infrastructure facilitates whole
research cycle as well as special
requests for Research IT infra.
Management actively engaged.
Documentation kept up to date.
Privacy By Design implemented.
Concerted efforts to maintain,
update & publicise
infrastructure. Metrics &
feedback used to optimise
services. Research IT staff
hired for tailored research
support.
Based on the ANDS RDM Framework: http://ands.org.au/guides/capability-maturity
14
example
Source: https://www.aicpa.org/InterestAreas/InformationTechnology/Resources/Privacy/GenerallyAcceptedPrivacyPrinciples/DownloadableDocuments/AICPA-
CICA-Privacy-Maturity-Model-ebook.pdf
15
Chief Information Security Officer
Data Protection Officer
Integrity Officer
Ethical Committee
…
New roles and collaborations
Context and Framing
Further Information
drs. Marlon Domingus
project manager
Research Data Management
Erasmus University Rotterdam
+31 10 4088006
domingus@ubib.eur.nl

Contenu connexe

Tendances

Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Sagara Gunathunga
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White PapaerKristyn Greenwood
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Gridbradley_g
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by designTommy Vandepitte
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingAbzetdin Adamov
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014kevintsmith
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Ontario Cloud SIG
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Peter Procházka
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyClaudiu Popa
 
Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance ComputingAbzetdin Adamov
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Otherbradley_g
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...Giulio Coraggio
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoEMarc Vael
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect stormUlf Mattsson
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB
 
Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Designbradley_g
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf toolsMarc Vael
 

Tendances (20)

Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by design
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision Making
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance Computing
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of Things
 
Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Design
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 

En vedette

'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...IanHallUK
 
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"iMedia Connection
 
Data is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel AmsterdamData is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel AmsterdamAurélie Pols
 
Get data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design conceptGet data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design conceptAurélie Pols
 
Slides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraalSlides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraalKennisnet
 
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design
EIC 2014   Oasis Workshop: Using XACML to implement Privacy by DesignEIC 2014   Oasis Workshop: Using XACML to implement Privacy by Design
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by DesignDavid Brossard
 
Privacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxswPrivacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxswKennisnet
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Digia Plc
 

En vedette (9)

'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
 
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
 
Data is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel AmsterdamData is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel Amsterdam
 
Get data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design conceptGet data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design concept
 
Privacy by Design
Privacy by DesignPrivacy by Design
Privacy by Design
 
Slides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraalSlides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraal
 
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design
EIC 2014   Oasis Workshop: Using XACML to implement Privacy by DesignEIC 2014   Oasis Workshop: Using XACML to implement Privacy by Design
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design
 
Privacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxswPrivacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxsw
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016
 

Similaire à Towards Privacy by Design. Key issues to unlock science.

Finding the Law for Sharing Data in Academia
Finding the Law for Sharing Data in AcademiaFinding the Law for Sharing Data in Academia
Finding the Law for Sharing Data in AcademiaMarlon Domingus
 
Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...Marlon Domingus
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Glenn Villanueva
 
Open Science in Research Libraries: Research, Research Integrity and Legal As...
Open Science in Research Libraries: Research, Research Integrity and Legal As...Open Science in Research Libraries: Research, Research Integrity and Legal As...
Open Science in Research Libraries: Research, Research Integrity and Legal As...Marlon Domingus
 
What are the Different Research Design / Ways That I can Approach My Law Dis...
What are the Different Research Design  / Ways That I can Approach My Law Dis...What are the Different Research Design  / Ways That I can Approach My Law Dis...
What are the Different Research Design / Ways That I can Approach My Law Dis...PhD Assistance
 
Stewardship data-guidelines- research information network jan 2008
Stewardship data-guidelines- research information network jan 2008Stewardship data-guidelines- research information network jan 2008
Stewardship data-guidelines- research information network jan 2008Eldad Sotnick-Yogev
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertiseblogzilla
 
Research ethics and problems encountred by reseachers
Research ethics and problems encountred by reseachers Research ethics and problems encountred by reseachers
Research ethics and problems encountred by reseachers ErTARUNKASHNI
 
What are the Different Research Design / Ways That I can Approach My Law Dis...
What are the Different Research Design  / Ways That I can Approach My Law Dis...What are the Different Research Design  / Ways That I can Approach My Law Dis...
What are the Different Research Design / Ways That I can Approach My Law Dis...PhD Assistance
 
ESRC Knowledge Brokerage conference: the third sector
ESRC Knowledge Brokerage conference: the third sectorESRC Knowledge Brokerage conference: the third sector
ESRC Knowledge Brokerage conference: the third sectorKarl Wilding
 
The value of engagement
The value of engagementThe value of engagement
The value of engagementwellcome.trust
 
The wrong story: regulation, innovation and research in the future of legal e...
The wrong story:regulation, innovation and research in the future of legal e...The wrong story:regulation, innovation and research in the future of legal e...
The wrong story: regulation, innovation and research in the future of legal e...The Higher Education Academy
 
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Project
 
Research Ethics -PPT.ppt
Research Ethics -PPT.pptResearch Ethics -PPT.ppt
Research Ethics -PPT.pptMeghanaShetty23
 
Lesson 1 Nature of Inqury and Research - Copy.pptx
Lesson 1 Nature of Inqury and Research - Copy.pptxLesson 1 Nature of Inqury and Research - Copy.pptx
Lesson 1 Nature of Inqury and Research - Copy.pptxDanicaAnnStaRosa2
 
Strategies to enhance research impact: Six lessons
Strategies to enhance research impact: Six lessonsStrategies to enhance research impact: Six lessons
Strategies to enhance research impact: Six lessonsODI_Webmaster
 

Similaire à Towards Privacy by Design. Key issues to unlock science. (20)

Finding the Law for Sharing Data in Academia
Finding the Law for Sharing Data in AcademiaFinding the Law for Sharing Data in Academia
Finding the Law for Sharing Data in Academia
 
Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...
 
LEARN Webinar
LEARN WebinarLEARN Webinar
LEARN Webinar
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
 
Open Science in Research Libraries: Research, Research Integrity and Legal As...
Open Science in Research Libraries: Research, Research Integrity and Legal As...Open Science in Research Libraries: Research, Research Integrity and Legal As...
Open Science in Research Libraries: Research, Research Integrity and Legal As...
 
What are the Different Research Design / Ways That I can Approach My Law Dis...
What are the Different Research Design  / Ways That I can Approach My Law Dis...What are the Different Research Design  / Ways That I can Approach My Law Dis...
What are the Different Research Design / Ways That I can Approach My Law Dis...
 
Stewardship data-guidelines- research information network jan 2008
Stewardship data-guidelines- research information network jan 2008Stewardship data-guidelines- research information network jan 2008
Stewardship data-guidelines- research information network jan 2008
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Research ethics and problems encountred by reseachers
Research ethics and problems encountred by reseachers Research ethics and problems encountred by reseachers
Research ethics and problems encountred by reseachers
 
What are the Different Research Design / Ways That I can Approach My Law Dis...
What are the Different Research Design  / Ways That I can Approach My Law Dis...What are the Different Research Design  / Ways That I can Approach My Law Dis...
What are the Different Research Design / Ways That I can Approach My Law Dis...
 
African Open Science Platform: Pilot Phase
African Open Science Platform: Pilot PhaseAfrican Open Science Platform: Pilot Phase
African Open Science Platform: Pilot Phase
 
ESRC Knowledge Brokerage conference: the third sector
ESRC Knowledge Brokerage conference: the third sectorESRC Knowledge Brokerage conference: the third sector
ESRC Knowledge Brokerage conference: the third sector
 
The value of engagement
The value of engagementThe value of engagement
The value of engagement
 
The wrong story: regulation, innovation and research in the future of legal e...
The wrong story:regulation, innovation and research in the future of legal e...The wrong story:regulation, innovation and research in the future of legal e...
The wrong story: regulation, innovation and research in the future of legal e...
 
Slideset for HEA Law Summit, Loughborough, January 2014
Slideset for HEA Law Summit, Loughborough, January 2014Slideset for HEA Law Summit, Loughborough, January 2014
Slideset for HEA Law Summit, Loughborough, January 2014
 
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
 
Research Ethics -PPT.ppt
Research Ethics -PPT.pptResearch Ethics -PPT.ppt
Research Ethics -PPT.ppt
 
Research Process (PR1)
Research Process (PR1)Research Process (PR1)
Research Process (PR1)
 
Lesson 1 Nature of Inqury and Research - Copy.pptx
Lesson 1 Nature of Inqury and Research - Copy.pptxLesson 1 Nature of Inqury and Research - Copy.pptx
Lesson 1 Nature of Inqury and Research - Copy.pptx
 
Strategies to enhance research impact: Six lessons
Strategies to enhance research impact: Six lessonsStrategies to enhance research impact: Six lessons
Strategies to enhance research impact: Six lessons
 

Plus de Marlon Domingus

Safeguarding privacy in research design
Safeguarding privacy in research designSafeguarding privacy in research design
Safeguarding privacy in research designMarlon Domingus
 
An itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchAn itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchMarlon Domingus
 
The GDPR perspectives: Philosophy
The GDPR perspectives: PhilosophyThe GDPR perspectives: Philosophy
The GDPR perspectives: PhilosophyMarlon Domingus
 
Privacy and Data Protection in Research
Privacy and Data Protection in ResearchPrivacy and Data Protection in Research
Privacy and Data Protection in ResearchMarlon Domingus
 
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoekVSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoekMarlon Domingus
 
Research Support @ Erasmus University Rotterdam
Research Support @ Erasmus University RotterdamResearch Support @ Erasmus University Rotterdam
Research Support @ Erasmus University RotterdamMarlon Domingus
 
Masterclass Research Support
Masterclass Research SupportMasterclass Research Support
Masterclass Research SupportMarlon Domingus
 

Plus de Marlon Domingus (7)

Safeguarding privacy in research design
Safeguarding privacy in research designSafeguarding privacy in research design
Safeguarding privacy in research design
 
An itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchAn itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and research
 
The GDPR perspectives: Philosophy
The GDPR perspectives: PhilosophyThe GDPR perspectives: Philosophy
The GDPR perspectives: Philosophy
 
Privacy and Data Protection in Research
Privacy and Data Protection in ResearchPrivacy and Data Protection in Research
Privacy and Data Protection in Research
 
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoekVSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
 
Research Support @ Erasmus University Rotterdam
Research Support @ Erasmus University RotterdamResearch Support @ Erasmus University Rotterdam
Research Support @ Erasmus University Rotterdam
 
Masterclass Research Support
Masterclass Research SupportMasterclass Research Support
Masterclass Research Support
 

Dernier

(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)riyaescorts54
 
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxFarihaAbdulRasheed
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxMurugaveni B
 
Microteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringMicroteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringPrajakta Shinde
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingNetHelix
 
User Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationUser Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationColumbia Weather Systems
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPirithiRaju
 
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...Universidade Federal de Sergipe - UFS
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...lizamodels9
 
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In DubaiDubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubaikojalkojal131
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensorsonawaneprad
 
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...D. B. S. College Kanpur
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfWildaNurAmalia2
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.PraveenaKalaiselvan1
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxNandakishor Bhaurao Deshmukh
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxmalonesandreagweneth
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxJorenAcuavera1
 
Pests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPirithiRaju
 

Dernier (20)

(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
 
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
 
Microteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringMicroteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical Engineering
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
 
User Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationUser Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather Station
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
 
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
 
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In DubaiDubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensor
 
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptx
 
Pests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdf
 

Towards Privacy by Design. Key issues to unlock science.

  • 1. Towards Privacy By Design Key issues to unlock science. Symposium: Designing and Shaping Open Science Amsterdam, April 5 2016 Marlon Domingus
  • 2. 1. Attitude and Trust 2. The Researcher 3. Maturity Models as Time Machines 4. New Roles and Collaborations 5. Context and Framing Key issues
  • 5. Responsible Research and Innovation Good Citizenship Corporate Social Responsibility Soft Law: Code of Conduct, Guidelines, ... Hard Law: Privacy Law, Patent Law, … Hard Law: Contracts, Agreements, ... The researcher in context
  • 6. European Code of Conduct National Code of Conduct University Policy - Research Integrity - Open Access, RDM Discipline Specific Code of Conduct The researcher in context: soft law
  • 7. European Funding Requirements National Funding Requirements University Requirements The researcher in context: requirements
  • 8. University A, Country A T1: researcher works at University A, co-operates with University B and C University B, Country A collaboration University C, Country B collaboration The researcher (& infrastructure) in context
  • 9. University A, Country A University B, Country A University C, Country Bcollaboration collaboration T2: researcher works at University B, co-operates with University C, D and E T3: … collaboration The researcher (& infrastructure) in context
  • 10. Researcher Mobility Responsible Research and Innovation Good Citizenship Corporate Social Responsibility Legal and Moral Requirements Research Cycle Transparency, Guidelines, Services, Infra, … The researcher in context
  • 12. 12
  • 13. It took some time and effort, but now we have Open Access and Open Science. How did we get here? 2020 Hindsight
  • 14. Legal Research Support Maturity Model Level 1 Level 2 Level 3 Level 4 Level 5 Initial Development Defined Managed Optimised Process is disorganised & ad hoc Process is under development Process is standardised, communicated Process is managed, measured Focus is on continuous improvement Institutional policies & procedures Policies & procedures may be undeveloped, not up to date, and/or inconsistent. Policies & procedures are developed & harmonised. Basic understanding of the gaps in the policies & guidelines. Policies & procedures are promulgated & absorbed into behaviours. Policies & procedures accepted as part of the culture & subject to audit. Policies & procedures are subject to review & improvement. Legal Research Support Legal support services are disorganised, research contracts and agreements are legally ad hoc supported, inconsistent and poorly publicised. Investment in legal expertise. Legal services identified & staffed. Responsibilities are defined. Documentation & awareness programs developed. Co-operation between legal experts & widespread availability of well documented services. Common knowledge available of all relevant legal research support topics. Widespread take up of legal services at an early stage in the research project. IPR and Privacy are acknowledged as critical to the institutional mission. Researcher’s feedback, research project’s lessons learned as well as analysis of awarded grant are used to update & improve legal research support services. IT infrastructure IT infrastructure provision is patchy, disorganised & poorly publicised & not supporting the whole research cycle. Funds are invested in technology & skills. Responsibilities are defined. Processes are established, defined & documented. Awareness of the different IT infra needs during the research cycle. Management shows active support. Facilities are well defined & communicated, standardised & integrated. The main aspects of the research cycle are supported in the IT infra. Key privacy aspects are secured in the IT infra. Infrastructure facilitates whole research cycle as well as special requests for Research IT infra. Management actively engaged. Documentation kept up to date. Privacy By Design implemented. Concerted efforts to maintain, update & publicise infrastructure. Metrics & feedback used to optimise services. Research IT staff hired for tailored research support. Based on the ANDS RDM Framework: http://ands.org.au/guides/capability-maturity 14
  • 16. Chief Information Security Officer Data Protection Officer Integrity Officer Ethical Committee … New roles and collaborations
  • 18. Further Information drs. Marlon Domingus project manager Research Data Management Erasmus University Rotterdam +31 10 4088006 domingus@ubib.eur.nl