(1) This procedure supports the Research Policy by stating the responsibilities and processes for the management of research data at Charles Sturt University (the University). (2) This procedure is intended to: (3) This procedure has the same scope as the Research Policy. (4) This procedure applies to: (5) As well as following this procedure, researchers must meet the research data management provisions of any contracts, copyright obligations, funding or collaboration agreements for their research. (6) The Intellectual Property Policy determines ownership of research data and primary material, which may also be influenced by other third-party agreements including funding agreements for projects. (7) This procedure supports the Research Policy and should be read alongside that policy. (8) The responsible conduct of research includes within its scope the appropriate generation, collection, access, use, analysis, disclosure, storage, retention, disposal, sharing and re-use of data and information. Researchers must acknowledge and clearly specify details regarding ownership, custodianship, access, licensing, and intended dissemination and use of any data collected, generated, or collated as part of their research projects. (9) Subject to the terms of agreement between the University and any other party: (10) It is the responsibility of staff and students to manage and retain the material and data on behalf of the University. (11) Researchers and supervisors should plan for and execute the handover of research data and primary materials at the conclusion of the research or when a researcher leaves the University to the responsible organisational unit, including information about access to and potential reuse of data. (12) The Office of the Deputy Vice-Chancellor (Research) will establish and maintain a register of Research Data Management Plans (RDMPs). (13) The RDMP will set out regulatory approval, data governance, and data management across all stages of the research data life cycle, including appropriate end-of-project plans (retention, dissemination, and archiving) so that other researchers (or the researchers themselves in the future) may benefit from the data. (14) RDMP planning should apply, to the extent possible, the findable, accessible, interoperable, and reusable (FAIR) data principles. (15) All researchers must create and submit an RDMP online using the form specified by the Office of the Deputy Vice-Chancellor (Research). Where a research project includes multiple researchers, the first-named researcher, or chief investigator, is responsible for completing and submitting the RDMP on behalf of the research team for each new research project before the research project commences. (16) The RDMP will set out regulatory approval, data governance, and data management across all stages of the research data life cycle, including appropriate end-of-project plans (retention, dissemination, and archiving). (17) The RDMP must be submitted as an accompanying document with applications submitted to any of the following committees: (18) Research students, in consultation with their research supervisor(s), must create and register an RDMP prior to the commencement of a research project. (19) Researchers must review their RDMP regularly, either annually or as changes arise, to ensure it accurately reflects the research project at any given time. Research students must review their RDMP in consultation with their research supervisor. (20) Researchers will plan for appropriate storage, access and use of research data at the beginning of the project, ensuring proper management of the data, data resilience and retrieval requirements, and avoiding potential data loss or security breaches for restricted data. This will be documented in the RDMP. Refer to Research Data Management Guidelines for help in assessing restricted data, appropriate security measures, and suggested platforms. (21) Researchers can request free data storage from the Division of Information Technology using the RDMP online form. (22) The use of non-University supported external service providers and platforms for collection, management, collaboration, analysis, archiving, or dissemination of restricted data must be approved by the Pro Vice-Chancellor Research (Performance and Governance) and included as part of an RDMP. Platforms must allow researchers and the University to comply with relevant legal, ethical, funder and publisher requirements, and provide research data security and privacy comparable to research data systems approved by the University. (23) Wherever possible and appropriate, physical research data, primary materials and research records should be digitised in a preferred format, to minimise the risk of loss or damage, and minimise physical storage requirements. (24) Physical data should be converted into a durable format if possible, quality checked for any errors and completeness, and then stored digitally. (25) After physical data has been converted to digital form, the original physical data can be destroyed once the minimum retention period for source documents has been met, and in accordance with the Records Management Procedure. (26) Physical data that cannot be digitised can be stored at the CSU Regional Archives. (27) The storage of physical data other than paper (non-standard formats for example) must be stored appropriately and ensure compliance with the University’s workplace, health and safety and other policies and procedures. (28) If storage of non-standard formats is not possible within the University, it may be necessary for researchers to gain written approval from the Deputy Vice-Chancellor (Research) to approach external third-parties for storage options. (29) The minimum retention periods for research data are set out in the Research Data Management Guidelines and align with the National Health & Medical Research Council (NHMRC) guidelines and the State Records Act 1998. Researchers must also comply with any contractual and/or third-party agreements, and discipline norms. (30) Retention of research data is required for all projects but in particular where the data is critical to the substantiation of research findings and cannot be readily or practically duplicated and for research that is: (31) Researchers must ensure that all research data owned by the University and sufficient metadata is made available to the University within 12 months of completing the research activity so that retention periods can be managed. (32) The minimum requirement for retention of data is normally five years (or as set out under the general retention authority GA 47 – Higher and further education records). The University, at its absolute discretion, may determine to keep the research data beyond the minimum period. Where this occurs, restricted data must be de-identified and any confidential or personal information removed. (33) Research data owned by a research student or an external party is not a University record,and the student or external party will be responsible for ensuring the appropriate periods are met and disposing of data, as appropriate. (34) Once the minimum retention periods for University owned research data have been met, dispoal or distruction must be in accordance with the Records Management Procedure. (35) With the exception of research data required as a State archive, faculties and research institutes will be responsible for managing and preserving the research data owned by the University until the minimum retention period is met. (36) Where physical research data owned by the University is required as a State archive and is not being used for other research activities, the research data and sufficient metadata must be made available to the CSU Regional Archives within 12 months of the completion of the research activity. (37) The CSU Regional Archives, as a regional archives centre, will maintain custody of the research data required as a State archive and facilitate access where appropriate, whilst control of the research data will pass to NSW State Archives and Records Authority. (38) At the conclusion of a project, or at the time of publication or dissemination of a research output, researchers should also disseminate their data, following best practices in their discipline and in accordance with any publisher or funder requirements. (39) Research outputs should conform to the FAIR data principles as far as possible. Appropriate context (descriptive, technical, methodological, and access information) should be provided for the data, either within the data or a separate metadata record. (40) University owned research data should be made open access where possible and only closed or restricted as necessary to meet ethical, contractual or intellectual property requirements. (41) Acess to data may be closed or restricted by: (42) Researchers must determine and apply appropriate techniques and safeguards for safely disseminating restricted data. (43) Researchers may choose an embargo period, up to 18 months or longer if approved by the Deputy Vice-Chancellor (Research), to allow time to publish results before making data open or public. (44) Researchers must register their metadata in CRO, using the data sets module linked to their researcher profile by the project end date. The entry must include the location (either physical or digital) of the dataset, as well as the organisational unit and contact information for the purpose of managing the dataset. The visibility of the metadata (public, University login required, or restricted) can be set as determined by the researcher and/or the research team. (45) Researchers given approved access to reuse data must comply with any existing conditions that apply to the data. (46) Researchers who reuse existing data sets and manipulate or make changes to create a new data set must manage the research data in accordance with this procedure. (47) Researchers must consult Research Data Management Guideline to determine minimum security measures for data management together with terms of any applicable research agreements. (48) There are various data protection techniques available including password protection on files and folders, encryption, de-identification, saving in ‘read-only’ formats and keeping portable storage devices locked away when not in use. (49) Researchers must provide the same level of care and protection to non-digital research data and primary materials, such as laboratory notebooks, interview recordings, biological specimens, and survey responses. (50) Where restricted data collected during research is lost or subjected to unauthorised access or disclosure, the researcher must report the research data security breach immediately to the Manager, Research Integrity and to other relevant parties including the relevant ethics or compliance committee. Researchers must initiate appropriate remedial action to reduce the likelihood of serious harm occurring from the inappropriate use of, access to, or loss of restricted data. (51) Researchers must report circumstances where a suspected or known security breach might have resulted in the unauthorised access, unintended disclosure, loss, theft, destruction or alteration of data, in accordance with the Information Technology Procedure - Acceptable Use and Access, Privacy Management Plan and Information Technology Procedure - Personal Data Breach. (52) All decisions throughout the research data lifecycle must be consistent with the ethics, compliance and safety requirements set out in, as relevant: (53) Ongoing training, education, assistance and advice in research data management will be offered in a variety of formats made available through the Division of Library Services and Office of Research Services and Graduate Studies. Training will be reviewed regularly to maintain currency. It is expected that all researchers, staff and research students will engage with the training, education and resources made available via the University and complete all compulsory training where appropriate. (54) Research Data Management Guidelines. (55) This procedure uses terms defined in the Research Policy, as well as the following:Research Data Management Procedure
Section 1 - Purpose
Scope
Section 2 - Policy
Section 3 - Procedure
Management of research data
Research data management plans (RDMP)
Data storage
Digitisation of physical data
Physical data storage
Retention, archiving and disposal of data
Research outputs and access
Reuse of data
Data security and confidentiality
Ethics and safety
Training and education
Section 4 - Guidelines
Section 5 - Glossary
View Current
This is the current version of this document. To view historic versions, click the link in the document's navigation bar.
Note: Examples of digitisation include scanning documentation, manuscripts or participant consent forms to PDF format; or photographing physical materials and storing them in TIFF format.