SlideShare una empresa de Scribd logo
1 de 14
Librarian RDM Training
Week 4: Ethics and copyright




   Robin Rice, Data Librarian
     Information Services
   Edinburgh: 5 December, 2012
Learning objectives
• Be aware of ethical requirements that apply to
  the collection and management of data involving
  human subjects.
• Understand the difference between privacy and
  confidentiality and how they apply to the
  management of research data.
• Know what IPR is and how it applies to your
  [users‟] research data.
Ethics of collecting data on
        human subjects
• The purpose and nature of the research
  itself
• The nature of consent obtained (e.g. opt-in
  versus opt-out participation)
• What data needs to be safeguarded during
  analysis and destroyed after its use
Which research is subject to
        ethical review?
• Using human participants or live animals
• Referencing individual subjects (people)
• Keeping identifiers for individuals
EXEMPT from ethics review
• freely available in the public domain, or
• obtained through pure observational
  studies of public behaviour:
        – are of human action that occurs in a forum open to the
          general public
        – are non-invasive
        – require no interaction with participants
        – do not identify participants
Some scholarly societies with
       ethics guidelines
• Association of Social Anthropologists of
  the UK and the Commonwealth
• British Association of Social Workers
• British Psychological Society
• British Educational Research Association
• British Society of Criminology
• British Sociological Association
• Social Research Association
Privacy and research
• Individuals are normally considered to have a
  „right to privacy‟ - the state of being free from
  intrusion or disturbance in one's private life or
  affairs.
• Research proposals need to indicate how data
  will be collected about human subjects. Ethical
  reviews will consider how intrusive this is for the
  subjects.
• The right to privacy implies the need to obtain
  consent from research subjects.
Confidentiality and research
• Oftentimes the consent form will include a
  promise to the subject that the researcher will
  not disclose confidential information.
• Keeping this agreement implies controls on
  storage, handling, and sharing of personal data.
• Strategies can include
  – If possible, collect the necessary data without using personally
    identifying information.
  – If personally identifying information is required, de-identify your
    data upon collection or as soon as possible thereafter.
  – Avoid transmitting unencrypted personal data electronically.
Intellectual Property Rights
• Intellectual Property Rights (IPR) can be defined
  as rights acquired over any work created or
  invented with the intellectual effort of an
  individual. These rights are time-limited and do
  not require explicit assertion.
• Owners of works are granted exclusive rights
  – to publish the work
  – to license the work‟s distribution to others
  – to sue in case of unlawful or deceptive copying
• It may be possible to waive these rights through
  a public declaration similar to a licence.
When do data enjoy copyright
          in the UK?
• When the dataset is an expressive work
  – Even if not, the metadata may enjoy copyright
• What if the data are merely a set of facts?
  – A simple list or spreadsheet might not enjoy copyright
  – The EU established a „database right‟ („sui generis‟
    right) to protect substantial investment made by
    database producers in obtaining, verifying and
    presenting database contents.
  – Also, the structure of the database, including the
    selection and arrangement of the database‟s contents
    may meet a test of intellectual creativity bestowing
    copyright.
Better not count on it though…
• What does “in the public domain” mean? Not
  everyone on the internet understands copyright
  is implicit.
• “Insubstantial amounts” of databases may be
  copied, but there is not a lot of case law to
  determine how much that is: under 50%?
• “Screen scraping” is a common method of
  obtaining raw data from online sources. This
  may be lawful, depending on what gets
  published.
To be continued…
• Data licensing to be covered in next session
• An advantage of data licensing is ability to be
  explicit about what can and cannot be done with
  the data obtained, compared with copyright.
• However, if a licence is breached, any third party
  who obtains the data is not under its obligation!
• A time-limited embargo in a repository may help
  data creators to gain time to publish results first.
Last word
• Best to create a public use dataset that you are
  comfortable about getting used, if putting online.
• And don‟t forget the Freedom of Information Act
  and related legislation may compel you to
  release data, especially if in the public interest!
Librarian RDM Training Week 4 Ethics Copyright

Más contenido relacionado

La actualidad más candente

Copyright and-intellectual-property-final
Copyright and-intellectual-property-finalCopyright and-intellectual-property-final
Copyright and-intellectual-property-finalApoorva Arora
 
Legal & ethical issues
Legal & ethical issuesLegal & ethical issues
Legal & ethical issuesmiajay414
 
Maintaining confidentiality
Maintaining confidentialityMaintaining confidentiality
Maintaining confidentialityempalmer
 
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...dri_ireland
 
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...FutureTDM
 
Freedom of Information Act requests - HR and employment conference for school...
Freedom of Information Act requests - HR and employment conference for school...Freedom of Information Act requests - HR and employment conference for school...
Freedom of Information Act requests - HR and employment conference for school...Browne Jacobson LLP
 
Information ethics
Information ethicsInformation ethics
Information ethicsSTCC Library
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsDan Michaluk
 
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...Where is the Share Button? Intellectual Property Issues Surrounding Data for ...
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...Rebekah Cummings
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual PropertyNazrul Islam
 
Complying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case studyComplying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case studyGarethKnight
 
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)Yokimura Dimaunahan
 
Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law Caveon Test Security
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and TechnologyMr Shipp
 
Privacy in Bigdata Era
Privacy in Bigdata  EraPrivacy in Bigdata  Era
Privacy in Bigdata EraSrinath Perera
 
Information ethics: Introducing our course
Information ethics: Introducing our courseInformation ethics: Introducing our course
Information ethics: Introducing our courseJenny Delasalle
 
Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...Alexandra Deschamps-Sonsino
 

La actualidad más candente (20)

Copyright and-intellectual-property-final
Copyright and-intellectual-property-finalCopyright and-intellectual-property-final
Copyright and-intellectual-property-final
 
Legal & ethical issues
Legal & ethical issuesLegal & ethical issues
Legal & ethical issues
 
Querying Patent Data for Empirical Scholarship : Tools and Strategies
Querying Patent Data for Empirical Scholarship : Tools and StrategiesQuerying Patent Data for Empirical Scholarship : Tools and Strategies
Querying Patent Data for Empirical Scholarship : Tools and Strategies
 
Maintaining confidentiality
Maintaining confidentialityMaintaining confidentiality
Maintaining confidentiality
 
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...
Rebecca Grant - Facilitating Connectivity: reducing copyright-related barrier...
 
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...
Data Analytics and the Legal Landscape: Intellectual Property and Data Protec...
 
Freedom of Information Act requests - HR and employment conference for school...
Freedom of Information Act requests - HR and employment conference for school...Freedom of Information Act requests - HR and employment conference for school...
Freedom of Information Act requests - HR and employment conference for school...
 
Information ethics
Information ethicsInformation ethics
Information ethics
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy laws
 
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...Where is the Share Button? Intellectual Property Issues Surrounding Data for ...
Where is the Share Button? Intellectual Property Issues Surrounding Data for ...
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Legal issues
Legal issuesLegal issues
Legal issues
 
Complying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case studyComplying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case study
 
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)
COPYRIGHT AND FAIR USE GUIDELINES (INFOGRAPHICS)
 
Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Privacy in Bigdata Era
Privacy in Bigdata  EraPrivacy in Bigdata  Era
Privacy in Bigdata Era
 
Information ethics: Introducing our course
Information ethics: Introducing our courseInformation ethics: Introducing our course
Information ethics: Introducing our course
 
Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...Recalculating: how we design the internet of things from the user up and the ...
Recalculating: how we design the internet of things from the user up and the ...
 

Similar a Librarian RDM Training Week 4 Ethics Copyright

Open Government Data: Understanding Open Access vs. Public Domain
Open Government Data: Understanding Open Access vs. Public DomainOpen Government Data: Understanding Open Access vs. Public Domain
Open Government Data: Understanding Open Access vs. Public DomainJennifer C. Boettcher
 
20160523 23 Research Data Things
20160523 23 Research Data Things20160523 23 Research Data Things
20160523 23 Research Data ThingsKatina Toufexis
 
FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?Robin Rice
 
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...SURFevents
 
Data sharing: Legal and ethical issues
Data sharing: Legal and ethical issuesData sharing: Legal and ethical issues
Data sharing: Legal and ethical issuesdancrane_open
 
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...ICPSR
 
IFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxIFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxEyalClyne
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of InformationFiona Beals
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
Clinical research ethics and regulation
Clinical research ethics and regulationClinical research ethics and regulation
Clinical research ethics and regulationRoger Watson
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxPallawiBulakh1
 
FSCI Sharing sensitive data
FSCI Sharing sensitive dataFSCI Sharing sensitive data
FSCI Sharing sensitive dataARDC
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesAdam Thierer
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerCharleston Conference
 

Similar a Librarian RDM Training Week 4 Ethics Copyright (20)

Preparing Research Data for Sharing
Preparing Research Data for SharingPreparing Research Data for Sharing
Preparing Research Data for Sharing
 
Open Government Data: Understanding Open Access vs. Public Domain
Open Government Data: Understanding Open Access vs. Public DomainOpen Government Data: Understanding Open Access vs. Public Domain
Open Government Data: Understanding Open Access vs. Public Domain
 
chapter05 (1).ppt
chapter05 (1).pptchapter05 (1).ppt
chapter05 (1).ppt
 
Access and licencing of data
Access and licencing of dataAccess and licencing of data
Access and licencing of data
 
20160523 23 Research Data Things
20160523 23 Research Data Things20160523 23 Research Data Things
20160523 23 Research Data Things
 
4-Privacy1.pptx
4-Privacy1.pptx4-Privacy1.pptx
4-Privacy1.pptx
 
FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?
 
Preparing research data for sharing
Preparing research data for sharingPreparing research data for sharing
Preparing research data for sharing
 
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...
Sharing personal data and the GDPR - how can it be done - Francisco Romero Pa...
 
Data sharing: Legal and ethical issues
Data sharing: Legal and ethical issuesData sharing: Legal and ethical issues
Data sharing: Legal and ethical issues
 
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
 
IFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxIFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptx
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of Information
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
Clinical research ethics and regulation
Clinical research ethics and regulationClinical research ethics and regulation
Clinical research ethics and regulation
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptx
 
FSCI Sharing sensitive data
FSCI Sharing sensitive dataFSCI Sharing sensitive data
FSCI Sharing sensitive data
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 

Más de Robin Rice

Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to dataRobin Rice
 
Research Data Support at the University of Edinburgh
Research Data Support at the University of EdinburghResearch Data Support at the University of Edinburgh
Research Data Support at the University of EdinburghRobin Rice
 
Research Data Service at the University of Edinburgh
Research Data Service at the University of EdinburghResearch Data Service at the University of Edinburgh
Research Data Service at the University of EdinburghRobin Rice
 
Research data support: a growth area for academic libraries?
Research data support: a growth area for academic libraries?Research data support: a growth area for academic libraries?
Research data support: a growth area for academic libraries? Robin Rice
 
Staffing Research Data Services at University of Edinburgh
Staffing Research Data Services at University of EdinburghStaffing Research Data Services at University of Edinburgh
Staffing Research Data Services at University of EdinburghRobin Rice
 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governanceRobin Rice
 
The University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service SuiteThe University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service SuiteRobin Rice
 
RDM Roadmap to the Future, or: Lords and Ladies of the Data
RDM Roadmap to the Future, or: Lords and Ladies of the DataRDM Roadmap to the Future, or: Lords and Ladies of the Data
RDM Roadmap to the Future, or: Lords and Ladies of the DataRobin Rice
 
Policies, procedures and standards for managing content in repositories.
Policies, procedures and standards for managing content in repositories.Policies, procedures and standards for managing content in repositories.
Policies, procedures and standards for managing content in repositories.Robin Rice
 
Providing research data services in changing times
Providing research data services in changing timesProviding research data services in changing times
Providing research data services in changing timesRobin Rice
 
The University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service SuiteThe University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service SuiteRobin Rice
 
Supporting researchers in managing data
Supporting researchers in managing dataSupporting researchers in managing data
Supporting researchers in managing dataRobin Rice
 
Managing active research in the University of Edinburgh
Managing active research in the University of EdinburghManaging active research in the University of Edinburgh
Managing active research in the University of EdinburghRobin Rice
 
Designing and delivering an international MOOC on Research Data Management an...
Designing and delivering an international MOOC on Research Data Management an...Designing and delivering an international MOOC on Research Data Management an...
Designing and delivering an international MOOC on Research Data Management an...Robin Rice
 
University of Edinburgh RDM Training: MANTRA & beyond
University of Edinburgh RDM Training: MANTRA & beyondUniversity of Edinburgh RDM Training: MANTRA & beyond
University of Edinburgh RDM Training: MANTRA & beyondRobin Rice
 
Overcoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjectsOvercoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjectsRobin Rice
 
‘Good, better, best’? Examining the range and rationales of institutional dat...
‘Good, better, best’? Examining the range and rationales of institutional dat...‘Good, better, best’? Examining the range and rationales of institutional dat...
‘Good, better, best’? Examining the range and rationales of institutional dat...Robin Rice
 
Data Library Services at the University of Edinburgh
Data Library Services at the University of EdinburghData Library Services at the University of Edinburgh
Data Library Services at the University of EdinburghRobin Rice
 
Guiding users through data deposit
Guiding users through data depositGuiding users through data deposit
Guiding users through data depositRobin Rice
 
What does Open Science, Open Scholarship look like?
What does Open Science, Open Scholarship look like?What does Open Science, Open Scholarship look like?
What does Open Science, Open Scholarship look like?Robin Rice
 

Más de Robin Rice (20)

Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to data
 
Research Data Support at the University of Edinburgh
Research Data Support at the University of EdinburghResearch Data Support at the University of Edinburgh
Research Data Support at the University of Edinburgh
 
Research Data Service at the University of Edinburgh
Research Data Service at the University of EdinburghResearch Data Service at the University of Edinburgh
Research Data Service at the University of Edinburgh
 
Research data support: a growth area for academic libraries?
Research data support: a growth area for academic libraries?Research data support: a growth area for academic libraries?
Research data support: a growth area for academic libraries?
 
Staffing Research Data Services at University of Edinburgh
Staffing Research Data Services at University of EdinburghStaffing Research Data Services at University of Edinburgh
Staffing Research Data Services at University of Edinburgh
 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governance
 
The University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service SuiteThe University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service Suite
 
RDM Roadmap to the Future, or: Lords and Ladies of the Data
RDM Roadmap to the Future, or: Lords and Ladies of the DataRDM Roadmap to the Future, or: Lords and Ladies of the Data
RDM Roadmap to the Future, or: Lords and Ladies of the Data
 
Policies, procedures and standards for managing content in repositories.
Policies, procedures and standards for managing content in repositories.Policies, procedures and standards for managing content in repositories.
Policies, procedures and standards for managing content in repositories.
 
Providing research data services in changing times
Providing research data services in changing timesProviding research data services in changing times
Providing research data services in changing times
 
The University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service SuiteThe University of Edinburgh Research Data Management Service Suite
The University of Edinburgh Research Data Management Service Suite
 
Supporting researchers in managing data
Supporting researchers in managing dataSupporting researchers in managing data
Supporting researchers in managing data
 
Managing active research in the University of Edinburgh
Managing active research in the University of EdinburghManaging active research in the University of Edinburgh
Managing active research in the University of Edinburgh
 
Designing and delivering an international MOOC on Research Data Management an...
Designing and delivering an international MOOC on Research Data Management an...Designing and delivering an international MOOC on Research Data Management an...
Designing and delivering an international MOOC on Research Data Management an...
 
University of Edinburgh RDM Training: MANTRA & beyond
University of Edinburgh RDM Training: MANTRA & beyondUniversity of Edinburgh RDM Training: MANTRA & beyond
University of Edinburgh RDM Training: MANTRA & beyond
 
Overcoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjectsOvercoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjects
 
‘Good, better, best’? Examining the range and rationales of institutional dat...
‘Good, better, best’? Examining the range and rationales of institutional dat...‘Good, better, best’? Examining the range and rationales of institutional dat...
‘Good, better, best’? Examining the range and rationales of institutional dat...
 
Data Library Services at the University of Edinburgh
Data Library Services at the University of EdinburghData Library Services at the University of Edinburgh
Data Library Services at the University of Edinburgh
 
Guiding users through data deposit
Guiding users through data depositGuiding users through data deposit
Guiding users through data deposit
 
What does Open Science, Open Scholarship look like?
What does Open Science, Open Scholarship look like?What does Open Science, Open Scholarship look like?
What does Open Science, Open Scholarship look like?
 

Último

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Último (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

Librarian RDM Training Week 4 Ethics Copyright

  • 1. Librarian RDM Training Week 4: Ethics and copyright Robin Rice, Data Librarian Information Services Edinburgh: 5 December, 2012
  • 2. Learning objectives • Be aware of ethical requirements that apply to the collection and management of data involving human subjects. • Understand the difference between privacy and confidentiality and how they apply to the management of research data. • Know what IPR is and how it applies to your [users‟] research data.
  • 3. Ethics of collecting data on human subjects • The purpose and nature of the research itself • The nature of consent obtained (e.g. opt-in versus opt-out participation) • What data needs to be safeguarded during analysis and destroyed after its use
  • 4. Which research is subject to ethical review? • Using human participants or live animals • Referencing individual subjects (people) • Keeping identifiers for individuals
  • 5. EXEMPT from ethics review • freely available in the public domain, or • obtained through pure observational studies of public behaviour: – are of human action that occurs in a forum open to the general public – are non-invasive – require no interaction with participants – do not identify participants
  • 6. Some scholarly societies with ethics guidelines • Association of Social Anthropologists of the UK and the Commonwealth • British Association of Social Workers • British Psychological Society • British Educational Research Association • British Society of Criminology • British Sociological Association • Social Research Association
  • 7. Privacy and research • Individuals are normally considered to have a „right to privacy‟ - the state of being free from intrusion or disturbance in one's private life or affairs. • Research proposals need to indicate how data will be collected about human subjects. Ethical reviews will consider how intrusive this is for the subjects. • The right to privacy implies the need to obtain consent from research subjects.
  • 8. Confidentiality and research • Oftentimes the consent form will include a promise to the subject that the researcher will not disclose confidential information. • Keeping this agreement implies controls on storage, handling, and sharing of personal data. • Strategies can include – If possible, collect the necessary data without using personally identifying information. – If personally identifying information is required, de-identify your data upon collection or as soon as possible thereafter. – Avoid transmitting unencrypted personal data electronically.
  • 9. Intellectual Property Rights • Intellectual Property Rights (IPR) can be defined as rights acquired over any work created or invented with the intellectual effort of an individual. These rights are time-limited and do not require explicit assertion. • Owners of works are granted exclusive rights – to publish the work – to license the work‟s distribution to others – to sue in case of unlawful or deceptive copying • It may be possible to waive these rights through a public declaration similar to a licence.
  • 10. When do data enjoy copyright in the UK? • When the dataset is an expressive work – Even if not, the metadata may enjoy copyright • What if the data are merely a set of facts? – A simple list or spreadsheet might not enjoy copyright – The EU established a „database right‟ („sui generis‟ right) to protect substantial investment made by database producers in obtaining, verifying and presenting database contents. – Also, the structure of the database, including the selection and arrangement of the database‟s contents may meet a test of intellectual creativity bestowing copyright.
  • 11. Better not count on it though… • What does “in the public domain” mean? Not everyone on the internet understands copyright is implicit. • “Insubstantial amounts” of databases may be copied, but there is not a lot of case law to determine how much that is: under 50%? • “Screen scraping” is a common method of obtaining raw data from online sources. This may be lawful, depending on what gets published.
  • 12. To be continued… • Data licensing to be covered in next session • An advantage of data licensing is ability to be explicit about what can and cannot be done with the data obtained, compared with copyright. • However, if a licence is breached, any third party who obtains the data is not under its obligation! • A time-limited embargo in a repository may help data creators to gain time to publish results first.
  • 13. Last word • Best to create a public use dataset that you are comfortable about getting used, if putting online. • And don‟t forget the Freedom of Information Act and related legislation may compel you to release data, especially if in the public interest!