Logo
  • Popular Resources
  • Popular Guides
  • About
  • Hours
Reserve study space
NECO Library

Library Home

College Home

NECO Canvas

NECO Portal

©2026, New England College of Optometry Library

InstagramSpotify
NECO Library
/Research Data Management
Research Data Management
/
RDM
/Share your data
Share your data
Share your data

Share your data

In order to share your data appropriately, you must both protect confidentiality and determine any access restrictions. You will also need to protect your own content. Once you've done these things, you're ready to upload your data to an open repository. Learn more by clicking the drop-downs below:

‣
Protect confidentiality
‣
Three types of data that need protection

There are three general types of data that need protection:

  1. Personally identifiable information (PII): Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means.
  2. Protected health information (PHI): Individually identifiable health information transmitted or maintained, in any form or medium, by a covered entity. The Health Insurance Portability and Accountability Act (HIPAA Privacy Rule) protects PHI by covered entities.
  3. Sensitive information: Information where, if disclosed, there is a significant likelihood or psychological, social, emotional, physical or reputational harm.
‣
Three types of identifiers

There are three types of identifiers that need to be considered:

  1. Direct identifiers such as phone numbers, names or social security numbers
  2. Indirect identifiers such as race or income
  3. Geographic identifiers such as zip codes or mailing addresses
‣
Ways to remove identifiers

The Department of Health and Human Services suggests two de-identification methods:

  1. The Expert Determination Method allows a person with appropriate knowledge to apply statistical methods to de-identify a data set and determine that the risk of disclosure is small, documenting the methods and results that led to their determination.
  2. The Safe Harbor Method stipulates removal of 18 types of identifiers, including direct and geographical identifiers.

The National Library of Medicine offers a tool for clinical text de-identification called the NLM-Scrubber.

‣
Determine access restrictions

There are three major types of access restrictions:

  1. Embargoes are a specific period of time when access to data will be limited
    • Typically last 6-24 months
    • Sometimes required by publishers
    • Funders might want data to be available within a certain time frame or in a timely manner, which might limit the embargo
  2. User affiliations may necessitate technological restrictions
    • Users may need to log into a system to access data
    • Membership might be required for access, or user must be part of a certain research group due to licensing agreements
  3. Data use agreements outline the agreement between the data producer and secondary data user
    • These agreements impose rules for the reuse, storage, re-dissemination and disposal of the data
    • Data use agreements are commonly required when data have the potential to identify human subjects, either indirectly or directly
‣
Protect your content

Data ownership issues need to be resolved at the beginning of your project

  • This is important, because the owner controls the dissemination, preservation and destruction of data
  • Figure out how, when and by whom data will be used in publications and in the future

Bear in mind that certain things can complicate data ownership issues, such as:

  • Cross-institutional collaborations
  • International collaborations
  • Institutional policies
  • Funder policies
‣
Upload your data to an open repository

Once you are certain your data can be shared publicly, you are ready to upload it to an open data repository. There are several free options available to you. Please also note that uploading to a public repository is not the same as preserving your data. Please contact the library staff for preservation options.

  • Figshare (note that the NIH now has a partnership with Figshare to make NIH-funded data more accessible)
  • Mendeley Data
  • Harvard Dataverse
  • Dryad Digital Repository
  • Find more data repositories at the Registry of Research Data Repositories