SlideShare una empresa de Scribd logo
1 de 18
Towards Privacy By Design
Key issues to unlock science.
Symposium: Designing and Shaping Open Science
Amsterdam, April 5 2016
Marlon Domingus
1. Attitude and Trust
2. The Researcher
3. Maturity Models as Time Machines
4. New Roles and Collaborations
5. Context and Framing
Key issues
Attitude
Source: https://cybersponse.com/data-breaches-by-the-numbers
Trust
Responsible Research and Innovation
Good Citizenship
Corporate Social Responsibility
Soft Law:
Code of
Conduct,
Guidelines,
...
Hard Law:
Privacy Law,
Patent Law,
…
Hard Law:
Contracts,
Agreements,
...
The researcher in context
European Code of Conduct
National Code of Conduct
University Policy
- Research Integrity
- Open Access, RDM
Discipline Specific
Code of Conduct
The researcher in context: soft law
European Funding Requirements
National Funding Requirements
University Requirements
The researcher in context: requirements
University A, Country A
T1: researcher works at University A, co-operates with University B and C
University B, Country A
collaboration University C, Country B
collaboration
The researcher (& infrastructure) in context
University A, Country A
University B, Country A
University C, Country Bcollaboration
collaboration
T2: researcher works at University B, co-operates with University C, D and E
T3: …
collaboration
The researcher (& infrastructure) in context
Researcher Mobility
Responsible Research and Innovation
Good Citizenship
Corporate Social Responsibility
Legal and Moral Requirements
Research Cycle
Transparency, Guidelines, Services, Infra, …
The researcher in context
Source: https://www.monash.edu/__data/assets/pdf_file/0010/385309/sensitive-decision-tree.pdf
Example
11
12
It took some time and effort,
but now we have Open Access and Open Science.
How did we get here?
2020 Hindsight
Legal Research Support Maturity Model
Level 1 Level 2 Level 3 Level 4 Level 5
Initial Development Defined Managed Optimised
Process is disorganised
& ad hoc
Process is under development Process is standardised,
communicated
Process is managed, measured Focus is on continuous
improvement
Institutional policies
& procedures
Policies & procedures may be
undeveloped, not up to date,
and/or inconsistent.
Policies & procedures are
developed & harmonised. Basic
understanding of the gaps in
the policies & guidelines.
Policies & procedures are
promulgated & absorbed into
behaviours.
Policies & procedures accepted as
part of the culture & subject to
audit.
Policies & procedures are
subject to review &
improvement.
Legal Research
Support
Legal support services are disorganised,
research contracts and agreements are
legally ad hoc supported, inconsistent and
poorly publicised.
Investment in legal expertise.
Legal services identified &
staffed. Responsibilities are
defined. Documentation &
awareness programs
developed.
Co-operation between legal
experts & widespread
availability of well documented
services. Common knowledge
available of all relevant legal
research support topics.
Widespread take up of legal
services at an early stage in the
research project. IPR and Privacy
are acknowledged as critical to
the institutional mission.
Researcher’s feedback,
research project’s lessons
learned as well as analysis of
awarded grant are used to
update & improve legal
research support services.
IT infrastructure IT infrastructure provision is patchy,
disorganised & poorly publicised &
not supporting the whole research cycle.
Funds are invested in
technology & skills.
Responsibilities are defined.
Processes are established,
defined & documented.
Awareness of the different IT
infra needs during the research
cycle.
Management shows active
support. Facilities are well
defined & communicated,
standardised & integrated. The
main aspects of the research
cycle are supported in the IT
infra. Key privacy aspects are
secured in the IT infra.
Infrastructure facilitates whole
research cycle as well as special
requests for Research IT infra.
Management actively engaged.
Documentation kept up to date.
Privacy By Design implemented.
Concerted efforts to maintain,
update & publicise
infrastructure. Metrics &
feedback used to optimise
services. Research IT staff
hired for tailored research
support.
Based on the ANDS RDM Framework: http://ands.org.au/guides/capability-maturity
14
example
Source: https://www.aicpa.org/InterestAreas/InformationTechnology/Resources/Privacy/GenerallyAcceptedPrivacyPrinciples/DownloadableDocuments/AICPA-
CICA-Privacy-Maturity-Model-ebook.pdf
15
Chief Information Security Officer
Data Protection Officer
Integrity Officer
Ethical Committee
…
New roles and collaborations
Context and Framing
Further Information
drs. Marlon Domingus
project manager
Research Data Management
Erasmus University Rotterdam
+31 10 4088006
domingus@ubib.eur.nl

Más contenido relacionado

La actualidad más candente

MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Ontario Cloud SIG
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
Ulf Mattsson
 

La actualidad más candente (20)

Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by design
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision Making
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance Computing
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of Things
 
Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Design
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 

Destacado

The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
iMedia Connection
 
Privacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxswPrivacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxsw
Kennisnet
 

Destacado (9)

'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
 
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
 
Data is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel AmsterdamData is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel Amsterdam
 
Get data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design conceptGet data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design concept
 
Privacy by Design
Privacy by DesignPrivacy by Design
Privacy by Design
 
Slides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraalSlides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraal
 
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design
EIC 2014   Oasis Workshop: Using XACML to implement Privacy by DesignEIC 2014   Oasis Workshop: Using XACML to implement Privacy by Design
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design
 
Privacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxswPrivacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxsw
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016
 

Similar a Towards Privacy by Design. Key issues to unlock science.

Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Glenn Villanueva
 
ESRC Knowledge Brokerage conference: the third sector
ESRC Knowledge Brokerage conference: the third sectorESRC Knowledge Brokerage conference: the third sector
ESRC Knowledge Brokerage conference: the third sector
Karl Wilding
 

Similar a Towards Privacy by Design. Key issues to unlock science. (20)

Finding the Law for Sharing Data in Academia
Finding the Law for Sharing Data in AcademiaFinding the Law for Sharing Data in Academia
Finding the Law for Sharing Data in Academia
 
Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...
 
LEARN Webinar
LEARN WebinarLEARN Webinar
LEARN Webinar
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
 
Open Science in Research Libraries: Research, Research Integrity and Legal As...
Open Science in Research Libraries: Research, Research Integrity and Legal As...Open Science in Research Libraries: Research, Research Integrity and Legal As...
Open Science in Research Libraries: Research, Research Integrity and Legal As...
 
What are the Different Research Design / Ways That I can Approach My Law Dis...
What are the Different Research Design  / Ways That I can Approach My Law Dis...What are the Different Research Design  / Ways That I can Approach My Law Dis...
What are the Different Research Design / Ways That I can Approach My Law Dis...
 
Stewardship data-guidelines- research information network jan 2008
Stewardship data-guidelines- research information network jan 2008Stewardship data-guidelines- research information network jan 2008
Stewardship data-guidelines- research information network jan 2008
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Research ethics and problems encountred by reseachers
Research ethics and problems encountred by reseachers Research ethics and problems encountred by reseachers
Research ethics and problems encountred by reseachers
 
What are the Different Research Design / Ways That I can Approach My Law Dis...
What are the Different Research Design  / Ways That I can Approach My Law Dis...What are the Different Research Design  / Ways That I can Approach My Law Dis...
What are the Different Research Design / Ways That I can Approach My Law Dis...
 
African Open Science Platform: Pilot Phase
African Open Science Platform: Pilot PhaseAfrican Open Science Platform: Pilot Phase
African Open Science Platform: Pilot Phase
 
ESRC Knowledge Brokerage conference: the third sector
ESRC Knowledge Brokerage conference: the third sectorESRC Knowledge Brokerage conference: the third sector
ESRC Knowledge Brokerage conference: the third sector
 
The value of engagement
The value of engagementThe value of engagement
The value of engagement
 
The wrong story: regulation, innovation and research in the future of legal e...
The wrong story:regulation, innovation and research in the future of legal e...The wrong story:regulation, innovation and research in the future of legal e...
The wrong story: regulation, innovation and research in the future of legal e...
 
Slideset for HEA Law Summit, Loughborough, January 2014
Slideset for HEA Law Summit, Loughborough, January 2014Slideset for HEA Law Summit, Loughborough, January 2014
Slideset for HEA Law Summit, Loughborough, January 2014
 
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
 
Research Ethics -PPT.ppt
Research Ethics -PPT.pptResearch Ethics -PPT.ppt
Research Ethics -PPT.ppt
 
Research Process (PR1)
Research Process (PR1)Research Process (PR1)
Research Process (PR1)
 
Lesson 1 Nature of Inqury and Research - Copy.pptx
Lesson 1 Nature of Inqury and Research - Copy.pptxLesson 1 Nature of Inqury and Research - Copy.pptx
Lesson 1 Nature of Inqury and Research - Copy.pptx
 
Strategies to enhance research impact: Six lessons
Strategies to enhance research impact: Six lessonsStrategies to enhance research impact: Six lessons
Strategies to enhance research impact: Six lessons
 

Más de Marlon Domingus

Más de Marlon Domingus (7)

Safeguarding privacy in research design
Safeguarding privacy in research designSafeguarding privacy in research design
Safeguarding privacy in research design
 
An itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchAn itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and research
 
The GDPR perspectives: Philosophy
The GDPR perspectives: PhilosophyThe GDPR perspectives: Philosophy
The GDPR perspectives: Philosophy
 
Privacy and Data Protection in Research
Privacy and Data Protection in ResearchPrivacy and Data Protection in Research
Privacy and Data Protection in Research
 
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoekVSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
 
Research Support @ Erasmus University Rotterdam
Research Support @ Erasmus University RotterdamResearch Support @ Erasmus University Rotterdam
Research Support @ Erasmus University Rotterdam
 
Masterclass Research Support
Masterclass Research SupportMasterclass Research Support
Masterclass Research Support
 

Último

Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Sérgio Sacani
 
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
ssuser79fe74
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Lokesh Kothari
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
Areesha Ahmad
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
PirithiRaju
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
RizalinePalanog2
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Sérgio Sacani
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
PirithiRaju
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Sérgio Sacani
 

Último (20)

Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdf
 
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questions
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptx
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
 

Towards Privacy by Design. Key issues to unlock science.

  • 1. Towards Privacy By Design Key issues to unlock science. Symposium: Designing and Shaping Open Science Amsterdam, April 5 2016 Marlon Domingus
  • 2. 1. Attitude and Trust 2. The Researcher 3. Maturity Models as Time Machines 4. New Roles and Collaborations 5. Context and Framing Key issues
  • 5. Responsible Research and Innovation Good Citizenship Corporate Social Responsibility Soft Law: Code of Conduct, Guidelines, ... Hard Law: Privacy Law, Patent Law, … Hard Law: Contracts, Agreements, ... The researcher in context
  • 6. European Code of Conduct National Code of Conduct University Policy - Research Integrity - Open Access, RDM Discipline Specific Code of Conduct The researcher in context: soft law
  • 7. European Funding Requirements National Funding Requirements University Requirements The researcher in context: requirements
  • 8. University A, Country A T1: researcher works at University A, co-operates with University B and C University B, Country A collaboration University C, Country B collaboration The researcher (& infrastructure) in context
  • 9. University A, Country A University B, Country A University C, Country Bcollaboration collaboration T2: researcher works at University B, co-operates with University C, D and E T3: … collaboration The researcher (& infrastructure) in context
  • 10. Researcher Mobility Responsible Research and Innovation Good Citizenship Corporate Social Responsibility Legal and Moral Requirements Research Cycle Transparency, Guidelines, Services, Infra, … The researcher in context
  • 12. 12
  • 13. It took some time and effort, but now we have Open Access and Open Science. How did we get here? 2020 Hindsight
  • 14. Legal Research Support Maturity Model Level 1 Level 2 Level 3 Level 4 Level 5 Initial Development Defined Managed Optimised Process is disorganised & ad hoc Process is under development Process is standardised, communicated Process is managed, measured Focus is on continuous improvement Institutional policies & procedures Policies & procedures may be undeveloped, not up to date, and/or inconsistent. Policies & procedures are developed & harmonised. Basic understanding of the gaps in the policies & guidelines. Policies & procedures are promulgated & absorbed into behaviours. Policies & procedures accepted as part of the culture & subject to audit. Policies & procedures are subject to review & improvement. Legal Research Support Legal support services are disorganised, research contracts and agreements are legally ad hoc supported, inconsistent and poorly publicised. Investment in legal expertise. Legal services identified & staffed. Responsibilities are defined. Documentation & awareness programs developed. Co-operation between legal experts & widespread availability of well documented services. Common knowledge available of all relevant legal research support topics. Widespread take up of legal services at an early stage in the research project. IPR and Privacy are acknowledged as critical to the institutional mission. Researcher’s feedback, research project’s lessons learned as well as analysis of awarded grant are used to update & improve legal research support services. IT infrastructure IT infrastructure provision is patchy, disorganised & poorly publicised & not supporting the whole research cycle. Funds are invested in technology & skills. Responsibilities are defined. Processes are established, defined & documented. Awareness of the different IT infra needs during the research cycle. Management shows active support. Facilities are well defined & communicated, standardised & integrated. The main aspects of the research cycle are supported in the IT infra. Key privacy aspects are secured in the IT infra. Infrastructure facilitates whole research cycle as well as special requests for Research IT infra. Management actively engaged. Documentation kept up to date. Privacy By Design implemented. Concerted efforts to maintain, update & publicise infrastructure. Metrics & feedback used to optimise services. Research IT staff hired for tailored research support. Based on the ANDS RDM Framework: http://ands.org.au/guides/capability-maturity 14
  • 16. Chief Information Security Officer Data Protection Officer Integrity Officer Ethical Committee … New roles and collaborations
  • 18. Further Information drs. Marlon Domingus project manager Research Data Management Erasmus University Rotterdam +31 10 4088006 domingus@ubib.eur.nl