Data Management

Write a Data Management or Sharing Plan

DMPTool

A web-based tool that help researchers write DMPs. JHU users can log in here. Send completed DMPs to dataservices@jhu.edu for feedback.

 

Grant Reviewer’s Guide

A user-friendly page of tables and checklists that can be used to quickly evaluate data management plans. More information about the worksheet can be found here.

 

Prepare a Data Management Plan Online Training 

This one-hour online training course contains 10 mini-modules, created by JHU Data Services. 

Find Funder Requirements for Data Sharing

Funders Data-related Mandates and Public Access Plans

Many US funders, both federal and private, now require grantees to provide a data management or sharing plan and to have their data available at the end of funded projects. The following organizations offer an overview of funders requirement of data-related mandates and public access plans. 

JHU Policies for Data Management and Sharing

Johns Hopkins University has established policies on issues related to data management that should be addressed in your data management plan.  Below are just a few of the more relevant highlights from each; however, there may be additional, relevant information that applies to your specific research. We suggest that JHU researchers read these policy documents in their entirety.

The Johns Hopkins University Policy on Access and Retention of Research Data and Materials covers various aspects of research data management.

  • Data generated by research projects at or under the auspices of Johns Hopkins University is owned by the University.

  • Primary investigator is responsible for storing data using a method that permits a complete retrospective audit if necessary.

  • Research data should be archived for a minimum period of 5 years after the date of any publication upon which it is based.

If your work involves human subjects, you may need to limit the extent of the research that you share to protect the rights of and privacy of individuals per JHU IRB policies and HIPAA regulation. NSF recognizes the need to adhere to these policies and regulations in its data sharing policy stating “privileged or confidential information should be released only in a form that protects the privacy of individuals and subjects involved.” Although your data management plan should explicitly state which data you will not be sharing due to IRB concerns, it is also important to try and share some form of your data.

The creation of intellectual property during the course of your research may have implications on if and when data will be shared. Many funding agencies, such as NSF, allows the retention of intellectual property to the grantees, but that does not preclude sharing of results, data and collections with other researchers.

The JHU Intellectual Property Policy defines IP “as any new and useful process, machine, composition of matter, life form, article of manufacture, software, copyrighted work (see IV. E) or tangible property.”

If you are working with Restricted Information, JHU Central IT has IT Technical and Security Policies about information security:

  • All laptops and mobile devices reasonably likely to be used to store Restricted information must have full disc encryption installed and activated.
  • Portable back-up media that may contain Restricted information must be encrypted.
  • Restricted information should not be transmitted across public networks (i.e. the Internet) in clear text.

Please refer to JHU IT Technical and Security Policies for more details about how to store, transmit and share your data securely.

Some JHU schools have additional policies that may address issues related to data management.

The Johns Hopkins Policy on Open Access requires JHU faculty to have their peer-reviewed journal articles available to the public. For more information on open access, check on the following two JHU resources: