Skip to Main Content

Research Data Management: Data Managment Planning

What is a Data Managment Plan?

A DMP is a living document that details the procedures for careful handling of data and other research outputs. A DMP follows the data through the lifecycle of the programme of research*, from collection to analysis and interpretation, sharing and dissemination, and long-term storage.

Science Europe Practical Guide to the International Alignment of Research Data Managment

Funders Policies

Open Data & Open Access Funders Policies

Guidelines to the Rules on Open Access
to Scientific Publications and Open Access to Research Data in Horizon 2020

Guidelines on FAIR Data Management in Horizon 2020

 

Data Curation Lifecycle

Data Managment Plan Catalogue

This DMP catalogue consists of DMP from finished projects, from a variety of European states and universities.

Example Data Management Plans

Why create a Data Managment Plan

DMPs are key to ensuring research quality and reliability.  DMPs help researchers and their teams establish and maintain consistency in handling of data, ensuring that all team members understand the process involved in collecting, analysing, storing, and sharing data and other outputs from a research endeavour. By documenting the provenance of the data generated throughout the programme of research, a DMP also enhances transparency, increasing the likelihood that the research results can be validated and reproduced. A carefully considered DMP makes it easier to retrieve datasets, allowing for rapid troubleshooting of potential problems while minimising risks and enabling research team members and collaborators to quickly find and verify results. DMPs have become a critical element of international best practice and are required by research funders in many diverse context

Data Encryption

Encryption is the process of encoding digital information in such a way that only authorised parties can view it.

Individual files can be encrypted, as can folders or entire disk volumes and USB storage devices. Encryption software uses an algorithm to encode information and a decryption key or password to decrypt the information.

Some types of encryption provide greater protection than others, the type and level of encryption used should correspond to the sensitivity of the data being protected.

Data Managment Checklist for Project Close or Researcher Off-Boarding

Data Management Checklist for Project Close or Researcher Off-Boarding

It is also important to consider what happens to the research data and other outputs when a staff member or student leaves SETU either at the end of a project or even during. 

SETU have prepared a checklist to guide researchers data management decisions at all career stages leaving SETU, or for projects during the completion or close-out phase of the project.  It aims to ensure that the data/outputs produced by the researcher and/or project are properly managed. Please see the document linked below 

Data Management Checklist for Project Close or Researcher Off-Boarding DOWNLOAD HERE