Before completing this section of your Research Data Management Plan you will need to determine:
In addition, management of all UWA research data must comply with relevant UWA and Australian guidelines.
It is imperative that the ownership of research data is clarified prior to the commencement of a project. Future storage and reuse are directly affected by the intellectual property rights of research data. IP Australia defines intellectual property as "...the property of your mind or proprietary knowledge. Basically, the productive new ideas you create. It can be an invention, trade mark, design, brand, or the application of your idea."
Data ownership should be documented in the Research Data Management Plan.
Ownership is affected by:
Generally, UWA students (including higher degree by research students) own their research data, whereas the University has ownership of data produced by UWA staff, as described in sections 3 and 4 of the UWA Intellectual Property Policy.
Research data may contain confidential or other sensitive information. It is important that you understand the level of sensitivity of your data so that it can be stored and shared appropriately (as outlined in the Store active data tab). The data sensitivity classifications used in the University have been adapted with permission from the UWA information Protection Classification Guide produced by Information Governance.
The UWA IP Classification scheme is a 4 level scale, with 1 being the least restrictive and least valued information and 4 being the greatest value and needing the most protection.
Level |
Classification |
Description |
Examples |
Who can access it |
1 |
Public |
Information that is Public is intended, or available, for release to the public. This classification includes information made available to read or download from our websites, and Open data (where the University publishes research data for manipulation by the public). Information classified as Public can be restricted both earlier in its lifecycle (e.g. before publication) and/or later once it has been removed from access by the public. Public information by default will have an insignificant consequence to the University, third parties or research subjects if unauthorised access occurs.
|
Data is either not sensitive and can be published unaltered or is sensitive data which has been irreversibly de-identified and has no other consequences associated with it being made public (e.g. reputational damage, commercially sensitive or contractual). |
Members of the public. |
2 |
Confidential |
Information that is Confidential is intended for use by a discrete group of users (for example, UWA staff, or a research group that may include higher degree by research students and/or selected external collaborators). This type of information is protected by requiring authentication using the standard UWA account (e.g. Uni ID). This will be the default classification for all information unless another classification is applied and should be seriously considered for most information to support the UWA Information Governance Framework Information Principle 6 which states that "Information will be Accessible; collaboration and sharing will be promoted and enabled by default". This supports the idea of open by default and restricted by exception which enables re-use of information, transfer of knowledge and minimisation of rework; and promotes cross function collaboration and understanding. Unauthorised access will have limited or minor consequences or impacts on the University, third parties or research subjects.
|
Data collected from animals, internal University data, working research data. |
Research group/collaborators only, with password protection. |
3 |
Confidential Restricted |
Information that is Confidential Restricted is intended for use by a discrete group of users with a business need based on their organisational function (for example, specific UWA staff and higher degree by research students only).This will usually be based on either the function of their role (e.g. Payroll for pay details), a specific project / initiative they are part of or the seniority of the staff member (e.g. Director, Senior Leadership team). Examples of this include such things as payroll details, some contracts, tenders and agreements and in general anything which contains Personally Identifiable Information (PII). Information to be released outside its designated access will need to be approved by the appropriate authority such as the Information Steward, or Business System Owner. Unauthorised access to Confidential Restricted information could have moderate consequences or impacts on the University, third parties or research subjects.
|
Identifiable data, e.g. personal name and contact details, geospatial coordinates |
Researchers who collected the original data |
4 |
Highly Restricted |
Information that is Highly Restricted is intended for use by a discrete group of users with a specific business need based on their individual role (often at an Executive level) or those with a very specific role which is related to that type of information (e.g. data used for double blinding researchers). Highly restricted information often contains sensitive personal information, legally privileged information, commercially sensitive information to UWA and/or a supplier, or information relating to animal/human ethics for research. Release of highly confidential information outside its designated access will need to be approved by an appropriate authority such as the Information Steward, Business System Owner or in some cases a specific named individual or role who has a legal responsibility for that information. Unauthorised access to Highly Restricted information by default will have a major or catastrophic consequence to the University, third parties or research subjects if unauthorised access occurs. Information that would have a catastrophic consequence to the University and research subjects if unauthorised access occurs would be handled differentially by controls around access (e.g. location, storage, and permissions) from that with a major consequence, where required.
|
Culturally sensitive data, data pertaining to minor or at-risk participants, e.g. Indigenous, children, people with a disability, people living under politically unstable regimes, war zones |
Chief investigators only |
The ratings (insignificant, minor, moderate, major and catastrophic) are qualitative measures of consequence used similarly to those used by the UWA Risk Matrix (as approved by the UWA Risk and Audit Committee).
If your research data is particularly difficult to classify and you require advice, you can contact UWA’s Information Governance team using the Information Governance (IG) Service Request form.
Select the Advice & Consultancy > Information Protection service, and then type in your question about data classification for the Information Governance team.
The qualitative measures of consequence below have been extracted from the UWA Risk Matrix and are used as the deciding factor in the decision tree above.
|
Insignificant |
Minor |
Moderate |
Major |
Extreme |
Reputation |
|
|
|
|
|
Research & Education |
|
|
|
|
|
Legislative compliance |
|
|
|
|
|
UWA has a long-held commitment to openness in academic research and international collaboration. Of equal importance is UWA's responsibility to ensure the security of its research and to implement protections against foreign interference. We all have a role to play in safeguarding Australia's research from efforts by foreign governments to misappropriate intellectual property and research findings. Your research data and any intellectual property is valuable but it is also an asset to clandestine foreign actors who seek to obtain such data for the benefit of a foreign actor. To ensure the protection of your data, it is important to select data storage which is sufficiently secure for the level of data sensitivity (see the Storage & Retention tab for more information on this).
Further information on Defence Trade Controls, the Defence and Strategic Goods List, and Foreign Interference Guidelines from the UWA Office of Research.
There are several policies and guidelines of relevance to research data management.
UWA governance:
Australian governance:
Australian Research Data Commons has extensive documentation on working with sensitive data for Australian researchers and the ARDC Guide on Data Sharing for Human Research Ethics Committees provides expert tips for documenting consent and data management in Human Research Ethics applications.
For further information, email staffsupport-lib@uwa.edu.au (UWA staff) or hdrsupport-lib@uwa.edu.au (UWA HDR students).
Except for logos, Canva designs, AI generated images or where otherwise indicated, content in this guide is licensed under a Creative Commons Attribution-ShareAlike 4.0 International Licence.