Skip to content

Commit f49445f

Browse files
authored
Merge pull request #128 from elixir-europe/g-data-protection
Add Data protection guidance + correct IT security guidance page markdown
2 parents 548dcfc + b7f92d5 commit f49445f

File tree

3 files changed

+110
-28
lines changed

3 files changed

+110
-28
lines changed

_data/sidebars/guidance.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ subitems:
1313
url: /g-support-networks
1414
- title: Creation of a legal framework
1515
url: /g-legal-framework
16+
- title: Data protection compliance
17+
url: /g-data-protection
1618
- title: IT security
1719
url: /g-security
1820

Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
---
2+
title: Data protection compliance
3+
description: How to be compliant with data protection legislation
4+
contributors: [Hana Marčetić, Heleri Inno, Aída Moure Fernández, Mijke Jetten, Jana Martínková, Diana Pilvar, Niclas Jareborg]
5+
page_id: g-data-protection
6+
type: [Guidance]
7+
related_pages: [mm-data-gdpr]
8+
---
9+
10+
## Context
11+
12+
Building on the *Legal Framework for Research Data* guidance, this section expands on data protection compliance, specifically focusing on the General Data Protection Regulation (GDPR). Guidance regarding procedural and technical measures to protect data is provided on the *IT security* guidance page. Data protection is part of responsible research practices; the new legislative framework regulates specifically how personal data can be shared and handled with regard to the data subject’s privacy.
13+
14+
GDPR defines two categories of data, namely ***personal data*** and *special category data*, often referred to as ***sensitive data***, where special catagory data is a subset of personal data. This law applies to data regarding all residents of the European Union (EU), regardless of whether or not their data is processed within or outside the EU, and legally binds all Member States, as well as those outside of the EU that process personal data of EU residents.
15+
16+
In practice, compliance with the data protection legislation is overseen by a **Data Protection Officer (DPO)**. According to the European Data Protection Supervisor, “the primary role of the Data Protection Officer (DPO) is to ensure that the organisation processes the personal data of its staff, customers, providers or any other individuals (also referred to as *data subjects*) in compliance with the applicable data protection rules.” All organisations, regardless of size or type, that handle EU residents’ personal information should appoint a DPO responsible for monitoring GDPR compliance. Whether a person can take on the DPO’s tasks internally or a dedicated DPO must be hired depends on meeting one of these criteria: being a public authority, carrying out large-scale, regular monitoring of data subjects or processing large-scale special categories of personal data as a core activity.
17+
18+
In most countries, there are no strict rules on when a DPO must be hired, but national legislation may provide specific guidance. Similarly, there are currently no EU-wide formal qualification requirements for the role, though expertise in data protection law and practices is expected.
19+
20+
Please be aware that this chapter does not replace legal advice and seeking out qualified legal help is strongly advised where necessary.
21+
22+
Relevant links:
23+
24+
* [European Data Protection Board guidelines, recommendations and best practices](https://www.edpb.europa.eu/our-work-tools/general-guidance/guidelines-recommendations-best-practices_en)
25+
* [GDPR Designation of the data protection officer](https://gdpr-info.eu/art-37-gdpr/)
26+
* [European Data Protection Supervisor’s DPO guidance](https://www.edps.europa.eu/data-protection/data-protection/reference-library/data-protection-officer-dpo_en)
27+
28+
## Guidance
29+
30+
Data protection in research ensures that personal and sensitive data are processed in compliance with the GDPR and related legislation, safeguarding privacy, ethical integrity, and trust. Effective data protection compliance requires a structured, proactive approach that embeds legal requirements into the daily research data lifecycle. While data stewards are not legal experts, they are essential in recognising risks, advising on data protection procedures, and connecting researchers with the Data Protection Officer (DPO) or relevant institutional authorities. These guidelines focus on four drivers: **clarity of roles, accessible procedures, contextual guidance, and continuous improvement**.
31+
32+
### **1\. Establish Foundational Roles and Resources**
33+
34+
These actions ensure that the organizational structure, roles, and necessary tools are clearly visible and accessible to researchers and staff. Data stewards facilitate compliance by connecting researchers with the appropriate institutional experts. They are the ones who know when to contact the legal or DPO teams, serving as translators between researchers and these experts.
35+
36+
**Define and Empower the Data Protection Officer (DPO)**
37+
38+
* Map responsibilities for data protection across researchers, data stewards, DPOs, ethics committees, and legal advisors.
39+
* Provide a one-page overview of responsibilities, highlighting what tasks belong to the DPO versus the data steward, Principal Investigator and IT staff. Clearly communicate the mandates of the different roles (consultation, monitoring, impact assessment).
40+
* Offer regular, role-specific training to ensure these individuals understand their duties regarding data handling and security.
41+
* Keep contact details for the DPO and related offices (Legal, TTO) visible in onboarding materials, presentations, intranet pages, and RDM pages.
42+
* Provide the DPO with executive support to enforce compliance across departments (if that is in the mandate of the DS role).
43+
44+
**Centralize and Standardize Documentation**
45+
46+
* Create and maintain a single, easily accessible information resource that collects and/or refers to all mandatory compliance templates and guidance (e.g., Data Protection Impact Assessment (DPIA) forms, Records of Processing Activities (ROPA) documentation, and consent templates).
47+
* Ensure templates and documentation are actively reviewed and updated by the DPO and legal counsel.
48+
49+
### **2\. Integrate Compliance into the Research Workflow**
50+
51+
The focus here is to move from reactive compliance to proactive involvement by making compliance checks mandatory parts of research milestones.
52+
53+
**Mandate DPO Involvement at Project Initiation**
54+
55+
* Establish a mandatory pre-screening procedure for all new projects or grant applications to identify whether personal or sensitive research data is involved.
56+
* If personal/sensitive data is identified, the project must consult with the DPO or Legal Counsel before the final grant submission or ethics review.
57+
* Build simple tools (e.g., a mandatory online project registration form) that automatically flag high-risk projects and initiate the DPIA process early in the planning stage.
58+
* Ensure the ROPA entry for any project handling personal data is created and reviewed as part of the formal project approval process.
59+
60+
### **3\. Ensure Ongoing Assurance and Continuous Improvement**
61+
62+
These steps ensure that compliance is maintained throughout the project lifecycle and that the overall system is regularly audited and optimized.
63+
64+
**Implement Regular Auditing and Evaluation**
65+
66+
* Support the DPO in performing ongoing evaluation of compliance procedures and systems, reporting findings to top leadership.
67+
* Establish a schedule for conducting regular internal or external audits to assess compliance levels on a sample of ongoing RD projects.
68+
69+
**Formalize Data Subject Rights Exercise**
70+
71+
* S.Support the DPO in creating a documented process for Data Subject Rights (e.g., access or erasure). This process should be clearly publicized and include specific steps for receiving, logging, and responding to requests.
72+
* Ensure that Data Stewards are trained and prepared to help execute these rights in a timely and compliant manner.
73+
74+
**Use Audit Results to Drive Optimization**
75+
76+
* Utilize findings from audits and Data Subject Rights requests to identify weaknesses in templates, policies, or training materials.
77+
* Regularly communicate system improvements and policy updates, demonstrating that the institutional approach to data protection is evolving based on identified needs.

pages/guidance/g-security.md

Lines changed: 31 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -17,46 +17,49 @@ Mature IT security emerges when policies are documented, staff are trained regul
1717
Data stewards play a pivotal role in bridging the gap between researchers and IT professionals—helping to embed data security concerns into research culture and daily practice. The mission of a data steward is to facilitate adoption of data security practices while still enabling awareness, practical guidance, and embedding security into workflows.
1818
Furthermore, data stewards play a vital role in adapting institutional security policies to the realities of the research environment. This input is crucial, as Information Security Officers (ISOs) often come from business-oriented backgrounds that may not align with the unique workflows and openness required in a research institute.
1919

20-
1. Promote awareness and visibility of IT security support and guidance
20+
**1\. Promote awareness and visibility of IT security support and guidance**
2121

22-
✔ Promote presence at the institutional level
22+
**✔ Promote presence at the institutional level**
2323

24-
Include references to IT security policies and procedures into institutional RDM and DMP guidelines.
25-
Include IT security guidance in onboarding and offboarding materials and general training portfolio.
26-
Share reminders about security practices via newsletters or internal communications.
24+
* Include references to IT security policies and procedures into institutional RDM and DMP guidelines.
25+
* Include IT security guidance in onboarding and offboarding materials and general training portfolio.
26+
* Share reminders about security practices via newsletters or internal communications.
2727

28-
2. Foster a Security-Conscious Culture
28+
**2\. Foster a Security-Conscious Culture**
2929

30-
Make it normal and safe to report potential vulnerabilities or mistakes.
30+
**** Make it normal and safe to report potential vulnerabilities or mistakes.
3131

32-
Encourage staff to ask about risks, reporting incidents, or implementing security measures. As a data steward, researchers are more open to share their IT security questions and doubts in face-to-face meetings, e.g. project planning kick-offs or DMP review.
33-
✔ Offer simple checklists or templates for common tasks.
32+
* Encourage staff to ask about risks, reporting incidents, or implementing security measures. As a data steward, researchers are more open to share their IT security questions and doubts in face-to-face meetings, e.g. project planning kick-offs or DMP review.
3433

35-
✔ Track issues and responses
34+
**** Offer simple checklists or templates for common tasks.
3635

37-
Analyse data management help desk questions/requests for potential security gaps or incidents to identify areas for improvement
38-
Use this information to refine guidance, training, or tools or notify IT security of problems.
39-
Communicate updates to procedures, templates, or IT tools that result from staff input.
36+
**✔ Track issues and responses**
4037

41-
3. Integrate IT security into research workflows
38+
* Analyse data management help desk questions/requests for potential security gaps or incidents to identify areas for improvement
39+
* Use this information to refine guidance, training, or tools or notify IT security of problems.
40+
* Communicate updates to procedures, templates, or IT tools that result from staff input.
4241

43-
✔ Position security guidance at key research milestones
42+
**3\. Integrate IT security into research workflows**
4443

45-
Align security checks with research project registration, data collection, storage, sharing, or long-term preservation.
46-
Ensure access controls, and risk assessments are applied at the right time.
47-
Translate high-level policies into actionable steps for researchers (e.g., password management, MFA, secure file storage).
44+
**✔ Position security guidance at key research milestones**
4845

49-
4. Establish collaboration with your information security office
46+
* Align security checks with research project registration, data collection, storage, sharing, or long-term preservation.
47+
* Ensure access controls, and risk assessments are applied at the right time.
48+
* Translate high-level policies into actionable steps for researchers (e.g., password management, MFA, secure file storage).
5049

51-
✔ Clarify roles and expectations in your relationship with information security office
52-
Share domain specific requirements and standards.
53-
Assess impact of new security measures on researchers and their activities.
54-
Contribute to policy development and awareness campaigns.
50+
**4\. Establish collaboration with your information security office**
5551

56-
✔Collaborate with IT security when introducing new tools for research data management
52+
**** Clarify roles and expectations in your relationship with information security office
5753

54+
* Share domain specific requirements and standards.
55+
* Assess impact of new security measures on researchers and their activities.
56+
* Contribute to policy development and awareness campaigns.
5857

59-
✔ Establish a communication channel with information security office, ensuring regular exchanges
60-
When a data steward notices a possible security issue, they should raise alarms and forward the issue to IT security contact.
61-
To effectively identify areas for improvement, Data Stewards must collaborate with IT Security on a regular basis (e.g., every 3–6 months). These joint reviews of incident logs and recurring security questions ensure that the Steward is informed of real-world gaps and can adjust guidance accordingly.
62-
Ensure your collaboration framework is documented and inform management about it.
58+
59+
****Collaborate with IT security when introducing new tools for research data management
60+
61+
**** Establish a communication channel with information security office, ensuring regular exchanges
62+
63+
* When a data steward notices a possible security issue, they should raise alarms and forward the issue to IT security contact.
64+
* To effectively identify areas for improvement, Data Stewards must collaborate with IT Security on a regular basis (e.g., every 3–6 months). These joint reviews of incident logs and recurring security questions ensure that the Steward is informed of real-world gaps and can adjust guidance accordingly.
65+
* Ensure your collaboration framework is documented and inform management about it.

0 commit comments

Comments
 (0)