Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
dcc:pdpsol:datadesctruction [2026/03/23 14:10] marlondcc:pdpsol:datadesctruction [2026/04/10 09:53] (current) alba
Line 2: Line 2:
 ====== Data Destruction ====== ====== Data Destruction ======
 ===== Introduction ===== ===== Introduction =====
-Although it is possible to prevent the collection of data, it is also important to think about the data that you might need for your research at first, but that become redundant later on. By planning for timely de-identification and destruction of your data, you can better protect your participants. You can use the examples below can help you prepare for the timely destruction of data.+Although it is possible to prevent the collection of data, it is also important to think about the data that you might need for your research at first, but that become redundant later on. By planning for timely de-identification and destruction of your data, you can better protect your participants. You can use the examples below to help you prepare for the timely destruction of data.
  
 ==== Secure and destroy personal identifiable notes ==== ==== Secure and destroy personal identifiable notes ====
Line 8: Line 8:
  
 ====Securely remove your data from devices and platforms ==== ====Securely remove your data from devices and platforms ====
-While collecting data, it is often necessary to use storage solutions that are no longer necessary after you have collected the data and are going to analyse the data. Transfer your data from these devices and platforms to a secure storage location as soon as possible. First make sure that you check the integrity of the data. As soon as this is confirmed, remove the data from the device or platform.+While collecting data, it is often necessary to use storage solutions that are no longer necessary after you have collected the data and are going to analyse the data. Transfer your data from these devices and platforms to a secure storage location as soon as possible. Firstmake sure that you check the integrity of the data. As soon as this is confirmed, remove the data from the device or platform.
  
 ====Final clean-up (after archiving) ==== ====Final clean-up (after archiving) ====