Libraries at University of Nebraska-Lincoln
Document Type
Article
Date of this Version
3-23-2017
Citation
Teperek, M et al 2017 Starting from the End: What to do when Restricted Data is released Data Science Journal, 16: 10, pp. 1–6, DOI: https://doi.org/10.5334/dsj-2017-010
Abstract
Repository managers can never be one hundred percent sure of the security of hosted research data. Even assuming that human errors and technical faults will never happen, repositories can be subject to hacking attacks. Therefore, repositories accepting personal/sensitive data (or other forms of restricted data) should have workflows in place with defined procedures to be followed should things go wrong and restricted data is inappropriately released. In this paper we will report on our considerations and procedures when restricted data from our institution was inappropriately released.
Included in
Intellectual Property Law Commons, Scholarly Communication Commons, Scholarly Publishing Commons
Comments
Open access.