Johns Hopkins University has established policies on issues related to data management that should be addressed in your data management plan.  Below are just a few of the more relevant highlights from each; however, there may be additional, relevant information that applies to your specific research. We suggest that JHU researchers read these policy documents in their entirety.  Data Ownership and Retention

The Johns Hopkins University Policy on Access and Retention of Research Data and Materials covers various aspects of research data management.

  • Data generated by research projects at or under the auspices of Johns Hopkins University is owned by the University.
  • Primary investigator is responsible for storing data using a method that permits a complete retrospective audit if necessary.
  • Research data should be archived for a minimum period of 5 years after the date of any publication upon which it is based.  Institutional Review Board (IRB)

If your work involves human subjects, you may need to limit the extent of the research that you share to protect the rights of and privacy of individuals per JHU IRB policies and HIPAA regulation. NSF recognizes the need to adhere to these policies and regulations in its data sharing policy stating “privileged or confidential information should be released only in a form that protects the privacy of individuals and subjects involved.” Although your data management plan should explicitly state which data you will not be sharing due to IRB concerns, it is also important to try and share some form of your data.  Intellectual Property

The creation of intellectual property during the course of your research may have implications on if and when data will be shared. Many funding agencies, such as NSF, allows the retention of intellectual property to the grantees, but that does not preclude sharing of results, data and collections with other researchers (see NSF Data Sharing Policy).

The JHU Intellectual Property Policy defines IP “as any new and useful process, machine, composition of matter, life form, article of manufacture, software, copyrighted work (see IV. E) or tangible property.”  IT Technical and Security Policies

If you are working with Restricted Information, JHU Central IT has IT Technical and Security Policies about information security:

  • All laptops and mobile devices reasonably likely to be used to store Restricted information must have full disc encryption installed and activated.
  • Portable back-up media that may contain Restricted information must be encrypted.
  • Restricted information should not be transmitted across public networks (i.e. the Internet) in clear text.

Please refer to JHU IT Technical and Security Policies for more details about how to store, transmit and share your data securely.  JHU School Policies on Responsible Conduct of Research

Some JHU schools have additional policies that may address issues related to data management.