Data Management Plans

This guide provides information and links to DMP guidelines and tools

Data Services

For more information or for assistance, please contact Data Services at datalib@uark.edu.

 

Guidelines

Before you begin your research, you want to know who owns the resulting data and if you may/must make it publicly available. In some cases, such as when you receive funding from a corporation, your sponsor may own the research data and forbid you to share it. In other cases, such as when you receive federal grant funding, you may be required to share the data. Keep in mind that some journals require authors to share data associated with an article. See specific requirements in the linksbelow.

New Guidance from the National Science and Technology Council

Organizational Infrastructure

Free and Easy Access

The repository provides broad, equitable, and maximally open access to datasets and their metadata free of charge in a timely manner after submission, consistent with legal and policy requirements related to maintaining privacy and confidentiality, Tribal and national data sovereignty, and protection of sensitive data.
Clear Use Guidance The repository ensures datasets are accompanied by documentation describing terms of dataset access and use (e.g., reuse licenses and need for approval by a data use committee).
Risk Management The repository has documented capabilities for ensuring that administrative, technical, and physical safeguards are employed to comply with applicable confidentiality, risk management, and continuous monitoring requirements for  sensitive data
Retention Policy The repository provides documentation on policies for data retention.
Long-term Organizational Sustainability The repository has a plan for long-term management of data, including maintaining integrity, authenticity, and availability of datasets; has contingency plans to ensure data are available and maintained during and after unforeseen events.

Digital Object Management

Unique Persistent Identifiers span style="line-height:107%">The repository assigns a dataset a citable, unique persistent identifier (PID or DPI), such as a digital object identifier (DOI), to support data discovery, reporting (e.g., of research progress), and research assessment (e.g., identifying the outputs of Federally funded research). The unique PID points to a persistent location that remains accessible even if the dataset is de-accessioned or no longer available.
Metadata The repository ensures datasets are accompanied by metadata to enable discovery, reuse, and citation of datasets, using schema that are appropriate to, and ideally widely used across, the communities that the repository serves.
Curation and Quality Assurance The repository provides or facilitates expert curation and quality assurance to improve the accuracy and integrity of datasets and metadata.
Curation and Quality Assurance The repository ensures datasets are accompanied by metadata that describe terms of reuse and provides the ability to measure attribution, citation, and reuse of data (e.g., through assignment of adequate and openly accessible metadata and unique PIDs).
Common Format The repository allows datasets and metadata to be accessed, downloaded, or exported from the repository in widely used, preferably non-proprietary, formats consistent with standards used in the disciplines the repository serves.
Provenance The repository has mechanisms in place to record the origin, the chain of custody, version control, and other modifications to submitted datasets and metadata.

Technology

 

Authentication

<The repository supports authentication of data submitters.

The repository has technical capabilities that facilitate associating submitter PIDs with those assigned to their deposited digital objects, such as datasets.
Preservation The repository has a plan for long-term management of data, building on a stable technical infrastructure and funding plans.
Security and Integrity The repository has documented measures in place to meet well established cybersecurity criteria for preventing unauthorized access to, modification of, or release of data, with levels of security that are appropriate to the sensitivity of data (e.g., the NIST Cybersecurity Framework:   https:www.nist.gov/cyberframework).

 

 

Department of Defense Guidelines

Department of Education - Institute of Education Sciences Guidelines

Institute of Museum and Library Services (IMLS) Guidelines

National Aeronautics and Space Administration Guidelines

National Endowment for the Humanities Guidelines

National Institute of Food and Agriculture Guidelines

National Institute of Justice (DOJ) Guidelines

National Institute of Standards and Technology (NIST) Guidelines

National Institutes of Health (NIH) Guidelines

National Oceanic and Atmospheric Administration (NOAA) Guidelines