JHU Policies for Data Management and Sharing
The Johns Hopkins University Policy on Access and Retention of Research Data and Materials covers various aspects of research data management.
- Data generated by research projects at or under the auspices of Johns Hopkins University is owned by the University.
- Primary investigator is responsible for storing data using a method that permits a complete retrospective audit if necessary.
- Research data should be archived for a minimum period of 5 years after the date of any publication upon which it is based.
If your work involves human subjects, you may need to limit the extent of the research that you share to protect the rights of and privacy of individuals per JHU IRB policies and HIPAA regulation. NSF recognizes the need to adhere to these policies and regulations in its data sharing policy stating “privileged or confidential information should be released only in a form that protects the privacy of individuals and subjects involved.” Although your data management plan should explicitly state which data you will not be sharing due to IRB concerns, it is also important to try and share some form of your data.
- Homewood campus IRB: http://web.jhu.edu/Homewood-IRB
- Bloomberg School of Public Health: http://www.jhsph.edu/irb/
- School of Medicine: http://www.hopkinsmedicine.org/institutional_review_board/
The creation of intellectual property during the course of your research may have implications on if and when data will be shared. Many funding agencies, such as NSF, allows the retention of intellectual property to the grantees, but that does not preclude sharing of results, data and collections with other researchers (see NSF Data Sharing Policy).
The JHU Intellectual Property Policy defines IP “as any new and useful process, machine, composition of matter, life form, article of manufacture, software, copyrighted work (see IV. E) or tangible property.”
- All laptops and mobile devices reasonably likely to be used to store Restricted information must have full disc encryption installed and activated.
- Portable back-up media that may contain Restricted information must be encrypted.
- Restricted information should not be transmitted across public networks (i.e. the Internet) in clear text.
Please refer to JHU IT Technical and Security Policies for more details about how to store, transmit and share your data securely.
Some JHU schools have additional policies that may address issues related to data management.
- Whiting School of Engineering: Section 4 of the Rules and Guidelines for Responsible Conduct of Research covers data gathering, storage, and retention.
- School of Medicine: Section3 of Rules and Guidelines for Responsible Conduct of Research