Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| dcc:pdpsol:datadesctruction [2026/02/19 13:27] – marlon | dcc:pdpsol:datadesctruction [2026/04/10 09:53] (current) – alba | ||
|---|---|---|---|
| Line 2: | Line 2: | ||
| ====== Data Destruction ====== | ====== Data Destruction ====== | ||
| ===== Introduction ===== | ===== Introduction ===== | ||
| - | Although it is possible to prevent the collection of data, it is also important to think about the data that you might need for your research at first, but that become redundant later on. By planning for timely de-identification and destruction of your data, you can better protect your participants. You can use the examples below can help you prepare for the timely destruction of data. | + | Although it is possible to prevent the collection of data, it is also important to think about the data that you might need for your research at first, but that become redundant later on. By planning for timely de-identification and destruction of your data, you can better protect your participants. You can use the examples below to help you prepare for the timely destruction of data. |
| ==== Secure and destroy personal identifiable notes ==== | ==== Secure and destroy personal identifiable notes ==== | ||
| Line 8: | Line 8: | ||
| ====Securely remove your data from devices and platforms ==== | ====Securely remove your data from devices and platforms ==== | ||
| - | While collecting data, it is often necessary to use storage solutions that are no longer necessary after you have collected the data and are going to analyse the data. Transfer your data from these devices and platforms to a secure storage location as soon as possible. First make sure that you check the integrity of the data. As soon as this is confirmed, remove the data from the device or platform. | + | While collecting data, it is often necessary to use storage solutions that are no longer necessary after you have collected the data and are going to analyse the data. Transfer your data from these devices and platforms to a secure storage location as soon as possible. First, make sure that you check the integrity of the data. As soon as this is confirmed, remove the data from the device or platform. |
| ====Final clean-up (after archiving) ==== | ====Final clean-up (after archiving) ==== | ||
| Line 14: | Line 14: | ||
| After you have confirmed that your data is archived correctly, you can critically review the data you have stored during your research: | After you have confirmed that your data is archived correctly, you can critically review the data you have stored during your research: | ||
| - | * Remove | + | * Check whether you have removed all copies of your data from secondary locations (e.g. the data collection platform, laptop, SurfDrive, Unishare, etc.) |
| * If you are no longer planning to use the data for future projects, consider also deleting it from your main working directory after archiving. Make sure to follow the agreements made with participants. | * If you are no longer planning to use the data for future projects, consider also deleting it from your main working directory after archiving. Make sure to follow the agreements made with participants. | ||
| - | * If you are still working with the data, consider tidying your working directory: | + | * If you are still working with the data, consider tidying your working directory: |
| - | - Delete any temporary working files (e.g. data that can easily be regenerated by archived scripts). | + | |
| - | - Remove duplicate or obsolete versions (e.g. final_v1.csv, | + | |
| + | ---- | ||
| [[dcc: | [[dcc: | ||