SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Towards Privacy By Design
Key issues to unlock science.
Symposium: Designing and Shaping Open Science
Amsterdam, April 5 2016
Marlon Domingus
1. Attitude and Trust
2. The Researcher
3. Maturity Models as Time Machines
4. New Roles and Collaborations
5. Context and Framing
Key issues
Attitude
Source: https://cybersponse.com/data-breaches-by-the-numbers
Trust
Responsible Research and Innovation
Good Citizenship
Corporate Social Responsibility
Soft Law:
Code of
Conduct,
Guidelines,
...
Hard Law:
Privacy Law,
Patent Law,
…
Hard Law:
Contracts,
Agreements,
...
The researcher in context
European Code of Conduct
National Code of Conduct
University Policy
- Research Integrity
- Open Access, RDM
Discipline Specific
Code of Conduct
The researcher in context: soft law
European Funding Requirements
National Funding Requirements
University Requirements
The researcher in context: requirements
University A, Country A
T1: researcher works at University A, co-operates with University B and C
University B, Country A
collaboration University C, Country B
collaboration
The researcher (& infrastructure) in context
University A, Country A
University B, Country A
University C, Country Bcollaboration
collaboration
T2: researcher works at University B, co-operates with University C, D and E
T3: …
collaboration
The researcher (& infrastructure) in context
Researcher Mobility
Responsible Research and Innovation
Good Citizenship
Corporate Social Responsibility
Legal and Moral Requirements
Research Cycle
Transparency, Guidelines, Services, Infra, …
The researcher in context
Source: https://www.monash.edu/__data/assets/pdf_file/0010/385309/sensitive-decision-tree.pdf
Example
11
12
It took some time and effort,
but now we have Open Access and Open Science.
How did we get here?
2020 Hindsight
Legal Research Support Maturity Model
Level 1 Level 2 Level 3 Level 4 Level 5
Initial Development Defined Managed Optimised
Process is disorganised
& ad hoc
Process is under development Process is standardised,
communicated
Process is managed, measured Focus is on continuous
improvement
Institutional policies
& procedures
Policies & procedures may be
undeveloped, not up to date,
and/or inconsistent.
Policies & procedures are
developed & harmonised. Basic
understanding of the gaps in
the policies & guidelines.
Policies & procedures are
promulgated & absorbed into
behaviours.
Policies & procedures accepted as
part of the culture & subject to
audit.
Policies & procedures are
subject to review &
improvement.
Legal Research
Support
Legal support services are disorganised,
research contracts and agreements are
legally ad hoc supported, inconsistent and
poorly publicised.
Investment in legal expertise.
Legal services identified &
staffed. Responsibilities are
defined. Documentation &
awareness programs
developed.
Co-operation between legal
experts & widespread
availability of well documented
services. Common knowledge
available of all relevant legal
research support topics.
Widespread take up of legal
services at an early stage in the
research project. IPR and Privacy
are acknowledged as critical to
the institutional mission.
Researcher’s feedback,
research project’s lessons
learned as well as analysis of
awarded grant are used to
update & improve legal
research support services.
IT infrastructure IT infrastructure provision is patchy,
disorganised & poorly publicised &
not supporting the whole research cycle.
Funds are invested in
technology & skills.
Responsibilities are defined.
Processes are established,
defined & documented.
Awareness of the different IT
infra needs during the research
cycle.
Management shows active
support. Facilities are well
defined & communicated,
standardised & integrated. The
main aspects of the research
cycle are supported in the IT
infra. Key privacy aspects are
secured in the IT infra.
Infrastructure facilitates whole
research cycle as well as special
requests for Research IT infra.
Management actively engaged.
Documentation kept up to date.
Privacy By Design implemented.
Concerted efforts to maintain,
update & publicise
infrastructure. Metrics &
feedback used to optimise
services. Research IT staff
hired for tailored research
support.
Based on the ANDS RDM Framework: http://ands.org.au/guides/capability-maturity
14
example
Source: https://www.aicpa.org/InterestAreas/InformationTechnology/Resources/Privacy/GenerallyAcceptedPrivacyPrinciples/DownloadableDocuments/AICPA-
CICA-Privacy-Maturity-Model-ebook.pdf
15
Chief Information Security Officer
Data Protection Officer
Integrity Officer
Ethical Committee
…
New roles and collaborations
Context and Framing
Further Information
drs. Marlon Domingus
project manager
Research Data Management
Erasmus University Rotterdam
+31 10 4088006
domingus@ubib.eur.nl

Weitere ähnliche Inhalte

Was ist angesagt?

Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Sagara Gunathunga
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White PapaerKristyn Greenwood
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Gridbradley_g
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by designTommy Vandepitte
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingAbzetdin Adamov
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014kevintsmith
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Ontario Cloud SIG
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Peter Procházka
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyClaudiu Popa
 
Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance ComputingAbzetdin Adamov
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Otherbradley_g
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...Giulio Coraggio
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoEMarc Vael
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect stormUlf Mattsson
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB
 
Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Designbradley_g
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf toolsMarc Vael
 

Was ist angesagt? (20)

Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by design
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision Making
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance Computing
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of Things
 
Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Design
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 

Andere mochten auch

'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...IanHallUK
 
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"iMedia Connection
 
Data is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel AmsterdamData is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel AmsterdamAurélie Pols
 
Get data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design conceptGet data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design conceptAurélie Pols
 
Slides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraalSlides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraalKennisnet
 
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design
EIC 2014   Oasis Workshop: Using XACML to implement Privacy by DesignEIC 2014   Oasis Workshop: Using XACML to implement Privacy by Design
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by DesignDavid Brossard
 
Privacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxswPrivacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxswKennisnet
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Digia Plc
 

Andere mochten auch (9)

'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
'Smart Cities'/'Open Data' event in Westminster on 13/11/14: EC/Olavi Luotone...
 
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
The Cookie is Crumbling: "Audience Recognition Crisis in Mobile"
 
Data is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel AmsterdamData is the new oil, privacy is the new green - Eye4Travel Amsterdam
Data is the new oil, privacy is the new green - Eye4Travel Amsterdam
 
Get data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design conceptGet data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design concept
 
Privacy by Design
Privacy by DesignPrivacy by Design
Privacy by Design
 
Slides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraalSlides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraal
 
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design
EIC 2014   Oasis Workshop: Using XACML to implement Privacy by DesignEIC 2014   Oasis Workshop: Using XACML to implement Privacy by Design
EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design
 
Privacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxswPrivacy by design mock up kennisnet sxsw
Privacy by design mock up kennisnet sxsw
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016
 

Ähnlich wie Towards Privacy by Design. Key issues to unlock science.

Finding the Law for Sharing Data in Academia
Finding the Law for Sharing Data in AcademiaFinding the Law for Sharing Data in Academia
Finding the Law for Sharing Data in AcademiaMarlon Domingus
 
Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...Marlon Domingus
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Glenn Villanueva
 
Open Science in Research Libraries: Research, Research Integrity and Legal As...
Open Science in Research Libraries: Research, Research Integrity and Legal As...Open Science in Research Libraries: Research, Research Integrity and Legal As...
Open Science in Research Libraries: Research, Research Integrity and Legal As...Marlon Domingus
 
What are the Different Research Design / Ways That I can Approach My Law Dis...
What are the Different Research Design  / Ways That I can Approach My Law Dis...What are the Different Research Design  / Ways That I can Approach My Law Dis...
What are the Different Research Design / Ways That I can Approach My Law Dis...PhD Assistance
 
Stewardship data-guidelines- research information network jan 2008
Stewardship data-guidelines- research information network jan 2008Stewardship data-guidelines- research information network jan 2008
Stewardship data-guidelines- research information network jan 2008Eldad Sotnick-Yogev
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertiseblogzilla
 
Research ethics and problems encountred by reseachers
Research ethics and problems encountred by reseachers Research ethics and problems encountred by reseachers
Research ethics and problems encountred by reseachers ErTARUNKASHNI
 
What are the Different Research Design / Ways That I can Approach My Law Dis...
What are the Different Research Design  / Ways That I can Approach My Law Dis...What are the Different Research Design  / Ways That I can Approach My Law Dis...
What are the Different Research Design / Ways That I can Approach My Law Dis...PhD Assistance
 
ESRC Knowledge Brokerage conference: the third sector
ESRC Knowledge Brokerage conference: the third sectorESRC Knowledge Brokerage conference: the third sector
ESRC Knowledge Brokerage conference: the third sectorKarl Wilding
 
The value of engagement
The value of engagementThe value of engagement
The value of engagementwellcome.trust
 
The wrong story: regulation, innovation and research in the future of legal e...
The wrong story:regulation, innovation and research in the future of legal e...The wrong story:regulation, innovation and research in the future of legal e...
The wrong story: regulation, innovation and research in the future of legal e...The Higher Education Academy
 
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Project
 
Research Ethics -PPT.ppt
Research Ethics -PPT.pptResearch Ethics -PPT.ppt
Research Ethics -PPT.pptMeghanaShetty23
 
Lesson 1 Nature of Inqury and Research - Copy.pptx
Lesson 1 Nature of Inqury and Research - Copy.pptxLesson 1 Nature of Inqury and Research - Copy.pptx
Lesson 1 Nature of Inqury and Research - Copy.pptxDanicaAnnStaRosa2
 
Strategies to enhance research impact: Six lessons
Strategies to enhance research impact: Six lessonsStrategies to enhance research impact: Six lessons
Strategies to enhance research impact: Six lessonsODI_Webmaster
 

Ähnlich wie Towards Privacy by Design. Key issues to unlock science. (20)

Finding the Law for Sharing Data in Academia
Finding the Law for Sharing Data in AcademiaFinding the Law for Sharing Data in Academia
Finding the Law for Sharing Data in Academia
 
Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...
 
LEARN Webinar
LEARN WebinarLEARN Webinar
LEARN Webinar
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
 
Open Science in Research Libraries: Research, Research Integrity and Legal As...
Open Science in Research Libraries: Research, Research Integrity and Legal As...Open Science in Research Libraries: Research, Research Integrity and Legal As...
Open Science in Research Libraries: Research, Research Integrity and Legal As...
 
What are the Different Research Design / Ways That I can Approach My Law Dis...
What are the Different Research Design  / Ways That I can Approach My Law Dis...What are the Different Research Design  / Ways That I can Approach My Law Dis...
What are the Different Research Design / Ways That I can Approach My Law Dis...
 
Stewardship data-guidelines- research information network jan 2008
Stewardship data-guidelines- research information network jan 2008Stewardship data-guidelines- research information network jan 2008
Stewardship data-guidelines- research information network jan 2008
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Research ethics and problems encountred by reseachers
Research ethics and problems encountred by reseachers Research ethics and problems encountred by reseachers
Research ethics and problems encountred by reseachers
 
What are the Different Research Design / Ways That I can Approach My Law Dis...
What are the Different Research Design  / Ways That I can Approach My Law Dis...What are the Different Research Design  / Ways That I can Approach My Law Dis...
What are the Different Research Design / Ways That I can Approach My Law Dis...
 
African Open Science Platform: Pilot Phase
African Open Science Platform: Pilot PhaseAfrican Open Science Platform: Pilot Phase
African Open Science Platform: Pilot Phase
 
ESRC Knowledge Brokerage conference: the third sector
ESRC Knowledge Brokerage conference: the third sectorESRC Knowledge Brokerage conference: the third sector
ESRC Knowledge Brokerage conference: the third sector
 
The value of engagement
The value of engagementThe value of engagement
The value of engagement
 
The wrong story: regulation, innovation and research in the future of legal e...
The wrong story:regulation, innovation and research in the future of legal e...The wrong story:regulation, innovation and research in the future of legal e...
The wrong story: regulation, innovation and research in the future of legal e...
 
Slideset for HEA Law Summit, Loughborough, January 2014
Slideset for HEA Law Summit, Loughborough, January 2014Slideset for HEA Law Summit, Loughborough, January 2014
Slideset for HEA Law Summit, Loughborough, January 2014
 
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
 
Research Ethics -PPT.ppt
Research Ethics -PPT.pptResearch Ethics -PPT.ppt
Research Ethics -PPT.ppt
 
Research Process (PR1)
Research Process (PR1)Research Process (PR1)
Research Process (PR1)
 
Lesson 1 Nature of Inqury and Research - Copy.pptx
Lesson 1 Nature of Inqury and Research - Copy.pptxLesson 1 Nature of Inqury and Research - Copy.pptx
Lesson 1 Nature of Inqury and Research - Copy.pptx
 
Strategies to enhance research impact: Six lessons
Strategies to enhance research impact: Six lessonsStrategies to enhance research impact: Six lessons
Strategies to enhance research impact: Six lessons
 

Mehr von Marlon Domingus

Safeguarding privacy in research design
Safeguarding privacy in research designSafeguarding privacy in research design
Safeguarding privacy in research designMarlon Domingus
 
An itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchAn itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchMarlon Domingus
 
The GDPR perspectives: Philosophy
The GDPR perspectives: PhilosophyThe GDPR perspectives: Philosophy
The GDPR perspectives: PhilosophyMarlon Domingus
 
Privacy and Data Protection in Research
Privacy and Data Protection in ResearchPrivacy and Data Protection in Research
Privacy and Data Protection in ResearchMarlon Domingus
 
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoekVSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoekMarlon Domingus
 
Research Support @ Erasmus University Rotterdam
Research Support @ Erasmus University RotterdamResearch Support @ Erasmus University Rotterdam
Research Support @ Erasmus University RotterdamMarlon Domingus
 
Masterclass Research Support
Masterclass Research SupportMasterclass Research Support
Masterclass Research SupportMarlon Domingus
 

Mehr von Marlon Domingus (7)

Safeguarding privacy in research design
Safeguarding privacy in research designSafeguarding privacy in research design
Safeguarding privacy in research design
 
An itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchAn itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and research
 
The GDPR perspectives: Philosophy
The GDPR perspectives: PhilosophyThe GDPR perspectives: Philosophy
The GDPR perspectives: Philosophy
 
Privacy and Data Protection in Research
Privacy and Data Protection in ResearchPrivacy and Data Protection in Research
Privacy and Data Protection in Research
 
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoekVSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
VSNU gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek
 
Research Support @ Erasmus University Rotterdam
Research Support @ Erasmus University RotterdamResearch Support @ Erasmus University Rotterdam
Research Support @ Erasmus University Rotterdam
 
Masterclass Research Support
Masterclass Research SupportMasterclass Research Support
Masterclass Research Support
 

Kürzlich hochgeladen

Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsSumit Kumar yadav
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPirithiRaju
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bSérgio Sacani
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencySheetal Arora
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINsankalpkumarsahoo174
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PPRINCE C P
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisDiwakar Mishra
 
DIFFERENCE IN BACK CROSS AND TEST CROSS
DIFFERENCE IN  BACK CROSS AND TEST CROSSDIFFERENCE IN  BACK CROSS AND TEST CROSS
DIFFERENCE IN BACK CROSS AND TEST CROSSLeenakshiTyagi
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfSumit Kumar yadav
 

Kürzlich hochgeladen (20)

Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questions
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C P
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
 
DIFFERENCE IN BACK CROSS AND TEST CROSS
DIFFERENCE IN  BACK CROSS AND TEST CROSSDIFFERENCE IN  BACK CROSS AND TEST CROSS
DIFFERENCE IN BACK CROSS AND TEST CROSS
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdf
 

Towards Privacy by Design. Key issues to unlock science.

  • 1. Towards Privacy By Design Key issues to unlock science. Symposium: Designing and Shaping Open Science Amsterdam, April 5 2016 Marlon Domingus
  • 2. 1. Attitude and Trust 2. The Researcher 3. Maturity Models as Time Machines 4. New Roles and Collaborations 5. Context and Framing Key issues
  • 5. Responsible Research and Innovation Good Citizenship Corporate Social Responsibility Soft Law: Code of Conduct, Guidelines, ... Hard Law: Privacy Law, Patent Law, … Hard Law: Contracts, Agreements, ... The researcher in context
  • 6. European Code of Conduct National Code of Conduct University Policy - Research Integrity - Open Access, RDM Discipline Specific Code of Conduct The researcher in context: soft law
  • 7. European Funding Requirements National Funding Requirements University Requirements The researcher in context: requirements
  • 8. University A, Country A T1: researcher works at University A, co-operates with University B and C University B, Country A collaboration University C, Country B collaboration The researcher (& infrastructure) in context
  • 9. University A, Country A University B, Country A University C, Country Bcollaboration collaboration T2: researcher works at University B, co-operates with University C, D and E T3: … collaboration The researcher (& infrastructure) in context
  • 10. Researcher Mobility Responsible Research and Innovation Good Citizenship Corporate Social Responsibility Legal and Moral Requirements Research Cycle Transparency, Guidelines, Services, Infra, … The researcher in context
  • 12. 12
  • 13. It took some time and effort, but now we have Open Access and Open Science. How did we get here? 2020 Hindsight
  • 14. Legal Research Support Maturity Model Level 1 Level 2 Level 3 Level 4 Level 5 Initial Development Defined Managed Optimised Process is disorganised & ad hoc Process is under development Process is standardised, communicated Process is managed, measured Focus is on continuous improvement Institutional policies & procedures Policies & procedures may be undeveloped, not up to date, and/or inconsistent. Policies & procedures are developed & harmonised. Basic understanding of the gaps in the policies & guidelines. Policies & procedures are promulgated & absorbed into behaviours. Policies & procedures accepted as part of the culture & subject to audit. Policies & procedures are subject to review & improvement. Legal Research Support Legal support services are disorganised, research contracts and agreements are legally ad hoc supported, inconsistent and poorly publicised. Investment in legal expertise. Legal services identified & staffed. Responsibilities are defined. Documentation & awareness programs developed. Co-operation between legal experts & widespread availability of well documented services. Common knowledge available of all relevant legal research support topics. Widespread take up of legal services at an early stage in the research project. IPR and Privacy are acknowledged as critical to the institutional mission. Researcher’s feedback, research project’s lessons learned as well as analysis of awarded grant are used to update & improve legal research support services. IT infrastructure IT infrastructure provision is patchy, disorganised & poorly publicised & not supporting the whole research cycle. Funds are invested in technology & skills. Responsibilities are defined. Processes are established, defined & documented. Awareness of the different IT infra needs during the research cycle. Management shows active support. Facilities are well defined & communicated, standardised & integrated. The main aspects of the research cycle are supported in the IT infra. Key privacy aspects are secured in the IT infra. Infrastructure facilitates whole research cycle as well as special requests for Research IT infra. Management actively engaged. Documentation kept up to date. Privacy By Design implemented. Concerted efforts to maintain, update & publicise infrastructure. Metrics & feedback used to optimise services. Research IT staff hired for tailored research support. Based on the ANDS RDM Framework: http://ands.org.au/guides/capability-maturity 14
  • 16. Chief Information Security Officer Data Protection Officer Integrity Officer Ethical Committee … New roles and collaborations
  • 18. Further Information drs. Marlon Domingus project manager Research Data Management Erasmus University Rotterdam +31 10 4088006 domingus@ubib.eur.nl