By DataCenter - Research for Justice
Need to keep the data safe for your research project? Here is a useful data security protocol document from the DataCenter for Research Justice.
What is a Data Security and Monitoring Plan?
According to Women’s Rights International, a Data Security and Monitoring Plan (DSMP) is “a set of agreed-upon principles and specific practices under which data will be shared without compromising the safety of individuals.” Variations on this approach are used in medical and non-medical human subject research, private sector contracts to protect trade secrets, and in large organizations that need to manage sensitive data across many people and platforms.
There are several different terms that describe this type of agreement, for example: data security (&) monitoring plan, data security (&) monitoring protocol, data safety (&) monitoring plan, data safety (&) monitoring protocol, data security agreement, data sharing agreement, and information security policy.
Information contained in this packet
This packet aims to cover two types of information about data security: general usage as well as usage by tribal entities engaged in digital mapping projects. As far as usage by tribes engaged in mapping, two documents from New Zealand include interesting examples for determining a) the degree of confidentially required by a given data set, and b) qualitative information about undergoing similar GIS mapping projects of sacred sites. These resources can be found in Part 4 of this packet. Examples from the Winnemem Wintu of Northern California (Part 3) and the Coeur d’Alene Tribe (Part 5) are also included. The general usage examples come from research organizations whose main objective is securing the identity and safety of human research subjects (Parts 6 and 8). Other templates and examples are from a private sector company (Part 7) and a university with diverse IT security needs (Part 9). The production of the original version of this resource packet was generously funded by the CA Consumer Protection Foundation in 2011. Permission has been granted for reprint of materials contributed by each authoring party of the materials that follow.
Please note: Protocols in relation to working with Indigenous communities vary across countries and communities. Intellectual property and privacy laws also vary. Check the situation where you are before proceeding.
- Creating a Data Security Plan: Questions to Consider
- Draft Agreement on Winnemem Wintu Sovereign Control of Maps
- GIS Mapping of Tribal Lands : Models from New Zealand
- Coeur d’Alene Data Sharing Protocol
- Women’s Rights International, Data Security and Monitoring Plan
- SANS Institute, Information Sensitivity Policy
- University of North Texas, Health Protocol Synopsis
- George Washington University, Information Security Policy
Download the full Data Security Protocols pdf.
For more see other guides and worksheets including:
- Starting your Research Project Worksheet
- Forming Survey Questions
- Citizen Generated Data: Toolkits and Guides
- How to do Research
- Research Methodologies Comparison Sheet
- Guide to publicly available data sources
- Data - Moral and ethical aspects
- Data protection
- Information technology - Moral and ethical aspects