SlideShare une entreprise Scribd logo
1  sur  14
Librarian RDM Training
Week 4: Ethics and copyright




   Robin Rice, Data Librarian
     Information Services
   Edinburgh: 5 December, 2012
Learning objectives
• Be aware of ethical requirements that apply to
  the collection and management of data involving
  human subjects.
• Understand the difference between privacy and
  confidentiality and how they apply to the
  management of research data.
• Know what IPR is and how it applies to your
  [users‟] research data.
Ethics of collecting data on
        human subjects
• The purpose and nature of the research
  itself
• The nature of consent obtained (e.g. opt-in
  versus opt-out participation)
• What data needs to be safeguarded during
  analysis and destroyed after its use
Which research is subject to
        ethical review?
• Using human participants or live animals
• Referencing individual subjects (people)
• Keeping identifiers for individuals
EXEMPT from ethics review
• freely available in the public domain, or
• obtained through pure observational
  studies of public behaviour:
        – are of human action that occurs in a forum open to the
          general public
        – are non-invasive
        – require no interaction with participants
        – do not identify participants
Some scholarly societies with
       ethics guidelines
• Association of Social Anthropologists of
  the UK and the Commonwealth
• British Association of Social Workers
• British Psychological Society
• British Educational Research Association
• British Society of Criminology
• British Sociological Association
• Social Research Association
Privacy and research
• Individuals are normally considered to have a
  „right to privacy‟ - the state of being free from
  intrusion or disturbance in one's private life or
  affairs.
• Research proposals need to indicate how data
  will be collected about human subjects. Ethical
  reviews will consider how intrusive this is for the
  subjects.
• The right to privacy implies the need to obtain
  consent from research subjects.
Confidentiality and research
• Oftentimes the consent form will include a
  promise to the subject that the researcher will
  not disclose confidential information.
• Keeping this agreement implies controls on
  storage, handling, and sharing of personal data.
• Strategies can include
  – If possible, collect the necessary data without using personally
    identifying information.
  – If personally identifying information is required, de-identify your
    data upon collection or as soon as possible thereafter.
  – Avoid transmitting unencrypted personal data electronically.
Intellectual Property Rights
• Intellectual Property Rights (IPR) can be defined
  as rights acquired over any work created or
  invented with the intellectual effort of an
  individual. These rights are time-limited and do
  not require explicit assertion.
• Owners of works are granted exclusive rights
  – to publish the work
  – to license the work‟s distribution to others
  – to sue in case of unlawful or deceptive copying
• It may be possible to waive these rights through
  a public declaration similar to a licence.
When do data enjoy copyright
          in the UK?
• When the dataset is an expressive work
  – Even if not, the metadata may enjoy copyright
• What if the data are merely a set of facts?
  – A simple list or spreadsheet might not enjoy copyright
  – The EU established a „database right‟ („sui generis‟
    right) to protect substantial investment made by
    database producers in obtaining, verifying and
    presenting database contents.
  – Also, the structure of the database, including the
    selection and arrangement of the database‟s contents
    may meet a test of intellectual creativity bestowing
    copyright.
Better not count on it though…
• What does “in the public domain” mean? Not
  everyone on the internet understands copyright
  is implicit.
• “Insubstantial amounts” of databases may be
  copied, but there is not a lot of case law to
  determine how much that is: under 50%?
• “Screen scraping” is a common method of
  obtaining raw data from online sources. This
  may be lawful, depending on what gets
  published.
To be continued…
• Data licensing to be covered in next session
• An advantage of data licensing is ability to be
  explicit about what can and cannot be done with
  the data obtained, compared with copyright.
• However, if a licence is breached, any third party
  who obtains the data is not under its obligation!
• A time-limited embargo in a repository may help
  data creators to gain time to publish results first.
Last word
• Best to create a public use dataset that you are
  comfortable about getting used, if putting online.
• And don‟t forget the Freedom of Information Act
  and related legislation may compel you to
  release data, especially if in the public interest!
Librarian RDM Training Week 4 Ethics Copyright

Contenu connexe

Tendances

Copyright and-intellectual-property-final
Copyright and-intellectual-property-finalCopyright and-intellectual-property-final
Copyright and-intellectual-property-finalApoorva Arora
 
Legal & ethical issues
Legal & ethical issuesLegal & ethical issues
Legal & ethical issuesmiajay414
 
Maintaining confidentiality
Maintaining confidentialityMaintaining confidentiality
Maintaining confidentialityempalmer
 
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...dri_ireland
 
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...FutureTDM
 
Freedom of Information Act requests - HR and employment conference for school...
Freedom of Information Act requests - HR and employment conference for school...Freedom of Information Act requests - HR and employment conference for school...
Freedom of Information Act requests - HR and employment conference for school...Browne Jacobson LLP
 
Information ethics
Information ethicsInformation ethics
Information ethicsSTCC Library
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsDan Michaluk
 
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...Where is the Share Button? Intellectual Property Issues Surrounding Data for ...
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...Rebekah Cummings
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual PropertyNazrul Islam
 
Complying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case studyComplying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case studyGarethKnight
 
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)Yokimura Dimaunahan
 
Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law Caveon Test Security
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and TechnologyMr Shipp
 
Privacy in Bigdata Era
Privacy in Bigdata  EraPrivacy in Bigdata  Era
Privacy in Bigdata EraSrinath Perera
 
Information ethics: Introducing our course
Information ethics: Introducing our courseInformation ethics: Introducing our course
Information ethics: Introducing our courseJenny Delasalle
 
Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...Alexandra Deschamps-Sonsino
 

Tendances (20)

Copyright and-intellectual-property-final
Copyright and-intellectual-property-finalCopyright and-intellectual-property-final
Copyright and-intellectual-property-final
 
Legal & ethical issues
Legal & ethical issuesLegal & ethical issues
Legal & ethical issues
 
Querying Patent Data for Empirical Scholarship : Tools and Strategies
Querying Patent Data for Empirical Scholarship : Tools and StrategiesQuerying Patent Data for Empirical Scholarship : Tools and Strategies
Querying Patent Data for Empirical Scholarship : Tools and Strategies
 
Maintaining confidentiality
Maintaining confidentialityMaintaining confidentiality
Maintaining confidentiality
 
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...
 
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...
 
Freedom of Information Act requests - HR and employment conference for school...
Freedom of Information Act requests - HR and employment conference for school...Freedom of Information Act requests - HR and employment conference for school...
Freedom of Information Act requests - HR and employment conference for school...
 
Information ethics
Information ethicsInformation ethics
Information ethics
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy laws
 
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...Where is the Share Button? Intellectual Property Issues Surrounding Data for ...
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Legal issues
Legal issuesLegal issues
Legal issues
 
Complying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case studyComplying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case study
 
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)
 
Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Privacy in Bigdata Era
Privacy in Bigdata  EraPrivacy in Bigdata  Era
Privacy in Bigdata Era
 
Information ethics: Introducing our course
Information ethics: Introducing our courseInformation ethics: Introducing our course
Information ethics: Introducing our course
 
Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...
 

Similaire à Librarian RDM Training Week 4 Ethics Copyright

Open Government Data: Understanding Open Access vs. Public Domain
Open Government Data: Understanding Open Access vs. Public DomainOpen Government Data: Understanding Open Access vs. Public Domain
Open Government Data: Understanding Open Access vs. Public DomainJennifer C. Boettcher
 
20160523 23 Research Data Things
20160523 23 Research Data Things20160523 23 Research Data Things
20160523 23 Research Data ThingsKatina Toufexis
 
FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?Robin Rice
 
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...SURFevents
 
Data sharing: Legal and ethical issues
Data sharing: Legal and ethical issuesData sharing: Legal and ethical issues
Data sharing: Legal and ethical issuesdancrane_open
 
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...ICPSR
 
IFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxIFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxEyalClyne
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of InformationFiona Beals
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
Clinical research ethics and regulation
Clinical research ethics and regulationClinical research ethics and regulation
Clinical research ethics and regulationRoger Watson
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxPallawiBulakh1
 
FSCI Sharing sensitive data
FSCI Sharing sensitive dataFSCI Sharing sensitive data
FSCI Sharing sensitive dataARDC
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesAdam Thierer
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerCharleston Conference
 

Similaire à Librarian RDM Training Week 4 Ethics Copyright (20)

Preparing Research Data for Sharing
Preparing Research Data for SharingPreparing Research Data for Sharing
Preparing Research Data for Sharing
 
Open Government Data: Understanding Open Access vs. Public Domain
Open Government Data: Understanding Open Access vs. Public DomainOpen Government Data: Understanding Open Access vs. Public Domain
Open Government Data: Understanding Open Access vs. Public Domain
 
chapter05 (1).ppt
chapter05 (1).pptchapter05 (1).ppt
chapter05 (1).ppt
 
Access and licencing of data
Access and licencing of dataAccess and licencing of data
Access and licencing of data
 
20160523 23 Research Data Things
20160523 23 Research Data Things20160523 23 Research Data Things
20160523 23 Research Data Things
 
4-Privacy1.pptx
4-Privacy1.pptx4-Privacy1.pptx
4-Privacy1.pptx
 
FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?
 
Preparing research data for sharing
Preparing research data for sharingPreparing research data for sharing
Preparing research data for sharing
 
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...
 
Data sharing: Legal and ethical issues
Data sharing: Legal and ethical issuesData sharing: Legal and ethical issues
Data sharing: Legal and ethical issues
 
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
 
IFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxIFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptx
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of Information
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
Clinical research ethics and regulation
Clinical research ethics and regulationClinical research ethics and regulation
Clinical research ethics and regulation
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptx
 
FSCI Sharing sensitive data
FSCI Sharing sensitive dataFSCI Sharing sensitive data
FSCI Sharing sensitive data
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 

Plus de Robin Rice

Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to dataRobin Rice
 
Research Data Support at the University of Edinburgh
Research Data Support at the University of EdinburghResearch Data Support at the University of Edinburgh
Research Data Support at the University of EdinburghRobin Rice
 
Research Data Service at the University of Edinburgh
Research Data Service at the University of EdinburghResearch Data Service at the University of Edinburgh
Research Data Service at the University of EdinburghRobin Rice
 
Research data support: a growth area for academic libraries?
Research data support: a growth area for academic libraries?Research data support: a growth area for academic libraries?
Research data support: a growth area for academic libraries? Robin Rice
 
Staffing Research Data Services at University of Edinburgh
Staffing Research Data Services at University of EdinburghStaffing Research Data Services at University of Edinburgh
Staffing Research Data Services at University of EdinburghRobin Rice
 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governanceRobin Rice
 
The University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service SuiteThe University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service SuiteRobin Rice
 
RDM Roadmap to the Future, or: Lords and Ladies of the Data
RDM Roadmap to the Future, or: Lords and Ladies of the DataRDM Roadmap to the Future, or: Lords and Ladies of the Data
RDM Roadmap to the Future, or: Lords and Ladies of the DataRobin Rice
 
Policies, procedures and standards for managing content in repositories.
Policies, procedures and standards for managing content in repositories.Policies, procedures and standards for managing content in repositories.
Policies, procedures and standards for managing content in repositories.Robin Rice
 
Providing research data services in changing times
Providing research data services in changing timesProviding research data services in changing times
Providing research data services in changing timesRobin Rice
 
The University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service SuiteThe University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service SuiteRobin Rice
 
Supporting researchers in managing data
Supporting researchers in managing dataSupporting researchers in managing data
Supporting researchers in managing dataRobin Rice
 
Managing active research in the University of Edinburgh
Managing active research in the University of EdinburghManaging active research in the University of Edinburgh
Managing active research in the University of EdinburghRobin Rice
 
Designing and delivering an international MOOC on Research Data Management an...
Designing and delivering an international MOOC on Research Data Management an...Designing and delivering an international MOOC on Research Data Management an...
Designing and delivering an international MOOC on Research Data Management an...Robin Rice
 
University of Edinburgh RDM Training: MANTRA & beyond
University of Edinburgh RDM Training: MANTRA & beyondUniversity of Edinburgh RDM Training: MANTRA & beyond
University of Edinburgh RDM Training: MANTRA & beyondRobin Rice
 
Overcoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjectsOvercoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjectsRobin Rice
 
‘Good, better, best’? Examining the range and rationales of institutional dat...
‘Good, better, best’? Examining the range and rationales of institutional dat...‘Good, better, best’? Examining the range and rationales of institutional dat...
‘Good, better, best’? Examining the range and rationales of institutional dat...Robin Rice
 
Data Library Services at the University of Edinburgh
Data Library Services at the University of EdinburghData Library Services at the University of Edinburgh
Data Library Services at the University of EdinburghRobin Rice
 
Guiding users through data deposit
Guiding users through data depositGuiding users through data deposit
Guiding users through data depositRobin Rice
 
What does Open Science, Open Scholarship look like?
What does Open Science, Open Scholarship look like?What does Open Science, Open Scholarship look like?
What does Open Science, Open Scholarship look like?Robin Rice
 

Plus de Robin Rice (20)

Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to data
 
Research Data Support at the University of Edinburgh
Research Data Support at the University of EdinburghResearch Data Support at the University of Edinburgh
Research Data Support at the University of Edinburgh
 
Research Data Service at the University of Edinburgh
Research Data Service at the University of EdinburghResearch Data Service at the University of Edinburgh
Research Data Service at the University of Edinburgh
 
Research data support: a growth area for academic libraries?
Research data support: a growth area for academic libraries?Research data support: a growth area for academic libraries?
Research data support: a growth area for academic libraries?
 
Staffing Research Data Services at University of Edinburgh
Staffing Research Data Services at University of EdinburghStaffing Research Data Services at University of Edinburgh
Staffing Research Data Services at University of Edinburgh
 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governance
 
The University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service SuiteThe University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service Suite
 
RDM Roadmap to the Future, or: Lords and Ladies of the Data
RDM Roadmap to the Future, or: Lords and Ladies of the DataRDM Roadmap to the Future, or: Lords and Ladies of the Data
RDM Roadmap to the Future, or: Lords and Ladies of the Data
 
Policies, procedures and standards for managing content in repositories.
Policies, procedures and standards for managing content in repositories.Policies, procedures and standards for managing content in repositories.
Policies, procedures and standards for managing content in repositories.
 
Providing research data services in changing times
Providing research data services in changing timesProviding research data services in changing times
Providing research data services in changing times
 
The University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service SuiteThe University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service Suite
 
Supporting researchers in managing data
Supporting researchers in managing dataSupporting researchers in managing data
Supporting researchers in managing data
 
Managing active research in the University of Edinburgh
Managing active research in the University of EdinburghManaging active research in the University of Edinburgh
Managing active research in the University of Edinburgh
 
Designing and delivering an international MOOC on Research Data Management an...
Designing and delivering an international MOOC on Research Data Management an...Designing and delivering an international MOOC on Research Data Management an...
Designing and delivering an international MOOC on Research Data Management an...
 
University of Edinburgh RDM Training: MANTRA & beyond
University of Edinburgh RDM Training: MANTRA & beyondUniversity of Edinburgh RDM Training: MANTRA & beyond
University of Edinburgh RDM Training: MANTRA & beyond
 
Overcoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjectsOvercoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjects
 
‘Good, better, best’? Examining the range and rationales of institutional dat...
‘Good, better, best’? Examining the range and rationales of institutional dat...‘Good, better, best’? Examining the range and rationales of institutional dat...
‘Good, better, best’? Examining the range and rationales of institutional dat...
 
Data Library Services at the University of Edinburgh
Data Library Services at the University of EdinburghData Library Services at the University of Edinburgh
Data Library Services at the University of Edinburgh
 
Guiding users through data deposit
Guiding users through data depositGuiding users through data deposit
Guiding users through data deposit
 
What does Open Science, Open Scholarship look like?
What does Open Science, Open Scholarship look like?What does Open Science, Open Scholarship look like?
What does Open Science, Open Scholarship look like?
 

Dernier

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 

Dernier (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 

Librarian RDM Training Week 4 Ethics Copyright

  • 1. Librarian RDM Training Week 4: Ethics and copyright Robin Rice, Data Librarian Information Services Edinburgh: 5 December, 2012
  • 2. Learning objectives • Be aware of ethical requirements that apply to the collection and management of data involving human subjects. • Understand the difference between privacy and confidentiality and how they apply to the management of research data. • Know what IPR is and how it applies to your [users‟] research data.
  • 3. Ethics of collecting data on human subjects • The purpose and nature of the research itself • The nature of consent obtained (e.g. opt-in versus opt-out participation) • What data needs to be safeguarded during analysis and destroyed after its use
  • 4. Which research is subject to ethical review? • Using human participants or live animals • Referencing individual subjects (people) • Keeping identifiers for individuals
  • 5. EXEMPT from ethics review • freely available in the public domain, or • obtained through pure observational studies of public behaviour: – are of human action that occurs in a forum open to the general public – are non-invasive – require no interaction with participants – do not identify participants
  • 6. Some scholarly societies with ethics guidelines • Association of Social Anthropologists of the UK and the Commonwealth • British Association of Social Workers • British Psychological Society • British Educational Research Association • British Society of Criminology • British Sociological Association • Social Research Association
  • 7. Privacy and research • Individuals are normally considered to have a „right to privacy‟ - the state of being free from intrusion or disturbance in one's private life or affairs. • Research proposals need to indicate how data will be collected about human subjects. Ethical reviews will consider how intrusive this is for the subjects. • The right to privacy implies the need to obtain consent from research subjects.
  • 8. Confidentiality and research • Oftentimes the consent form will include a promise to the subject that the researcher will not disclose confidential information. • Keeping this agreement implies controls on storage, handling, and sharing of personal data. • Strategies can include – If possible, collect the necessary data without using personally identifying information. – If personally identifying information is required, de-identify your data upon collection or as soon as possible thereafter. – Avoid transmitting unencrypted personal data electronically.
  • 9. Intellectual Property Rights • Intellectual Property Rights (IPR) can be defined as rights acquired over any work created or invented with the intellectual effort of an individual. These rights are time-limited and do not require explicit assertion. • Owners of works are granted exclusive rights – to publish the work – to license the work‟s distribution to others – to sue in case of unlawful or deceptive copying • It may be possible to waive these rights through a public declaration similar to a licence.
  • 10. When do data enjoy copyright in the UK? • When the dataset is an expressive work – Even if not, the metadata may enjoy copyright • What if the data are merely a set of facts? – A simple list or spreadsheet might not enjoy copyright – The EU established a „database right‟ („sui generis‟ right) to protect substantial investment made by database producers in obtaining, verifying and presenting database contents. – Also, the structure of the database, including the selection and arrangement of the database‟s contents may meet a test of intellectual creativity bestowing copyright.
  • 11. Better not count on it though… • What does “in the public domain” mean? Not everyone on the internet understands copyright is implicit. • “Insubstantial amounts” of databases may be copied, but there is not a lot of case law to determine how much that is: under 50%? • “Screen scraping” is a common method of obtaining raw data from online sources. This may be lawful, depending on what gets published.
  • 12. To be continued… • Data licensing to be covered in next session • An advantage of data licensing is ability to be explicit about what can and cannot be done with the data obtained, compared with copyright. • However, if a licence is breached, any third party who obtains the data is not under its obligation! • A time-limited embargo in a repository may help data creators to gain time to publish results first.
  • 13. Last word • Best to create a public use dataset that you are comfortable about getting used, if putting online. • And don‟t forget the Freedom of Information Act and related legislation may compel you to release data, especially if in the public interest!