For more information or for assistance, please contact Data Services at datalib@uark.edu.
Before you begin your research, you want to know who owns the resulting data and if you may/must make it publicly available. In some cases, such as when you receive funding from a corporation, your sponsor may own the research data and forbid you to share it. In other cases, such as when you receive federal grant funding, you may be required to share the data. Keep in mind that some journals require authors to share data associated with an article. See specific requirements in the linksbelow.
Organizational Infrastructure
Free and Easy Access |
The repository provides broad, equitable, and maximally open access to datasets and their metadata free of charge in a timely manner after submission, consistent with legal and policy requirements related to maintaining privacy and confidentiality, Tribal and national data sovereignty, and protection of sensitive data. |
Clear Use Guidance | The repository ensures datasets are accompanied by documentation describing terms of dataset access and use (e.g., reuse licenses and need for approval by a data use committee). |
Risk Management | The repository has documented capabilities for ensuring that administrative, technical, and physical safeguards are employed to comply with applicable confidentiality, risk management, and continuous monitoring requirements for sensitive data |
Retention Policy | The repository provides documentation on policies for data retention. |
Long-term Organizational Sustainability | The repository has a plan for long-term management of data, including maintaining integrity, authenticity, and availability of datasets; has contingency plans to ensure data are available and maintained during and after unforeseen events. |
Digital Object Management
Unique Persistent Identifiers | span style="line-height:107%">The repository assigns a dataset a citable, unique persistent identifier (PID or DPI), such as a digital object identifier (DOI), to support data discovery, reporting (e.g., of research progress), and research assessment (e.g., identifying the outputs of Federally funded research). The unique PID points to a persistent location that remains accessible even if the dataset is de-accessioned or no longer available. |
Metadata | The repository ensures datasets are accompanied by metadata to enable discovery, reuse, and citation of datasets, using schema that are appropriate to, and ideally widely used across, the communities that the repository serves. |
Curation and Quality Assurance | The repository provides or facilitates expert curation and quality assurance to improve the accuracy and integrity of datasets and metadata. |
Curation and Quality Assurance | The repository ensures datasets are accompanied by metadata that describe terms of reuse and provides the ability to measure attribution, citation, and reuse of data (e.g., through assignment of adequate and openly accessible metadata and unique PIDs). |
Common Format | The repository allows datasets and metadata to be accessed, downloaded, or exported from the repository in widely used, preferably non-proprietary, formats consistent with standards used in the disciplines the repository serves. |
Provenance | The repository has mechanisms in place to record the origin, the chain of custody, version control, and other modifications to submitted datasets and metadata. |
Technology
Authentication |
<The repository supports authentication of data submitters. The repository has technical capabilities that facilitate associating submitter PIDs with those assigned to their deposited digital objects, such as datasets. |
Preservation | The repository has a plan for long-term management of data, building on a stable technical infrastructure and funding plans. |
Security and Integrity | The repository has documented measures in place to meet well established cybersecurity criteria for preventing unauthorized access to, modification of, or release of data, with levels of security that are appropriate to the sensitivity of data (e.g., the NIST Cybersecurity Framework: https:www.nist.gov/cyberframework). |
When investigating a specific division's guidelines please also review the NSF general guidelines.
For all documents applicable to a specific division, please use the DMP Tool Funders requirements link above.