Ne pas enlever ce code qui permet l'affichage de l'image dans la bannière du portail

3. Data Life Cycle

Download PDF

3.6.2 Controlled/Restricted Access

Who will be allowed to find, read, use, analyze, transform, disseminate, and share the data? If this is not an open access context, all these questions are most relevant.

It is important to determine who will have data access privileges throughout the data production process and to clearly define the boundaries with respect to data edition/modification.

When data are ready for publication, decisions have to be made regarding the conditions of use. It is possible to limit data use to a specific user group, a research team or a community of practice, especially when dealing with sensitive or confidential data. In such cases, user authentication can be mandatory (with user identification and password requirements) in order to determine who the data consumers are. However, as soon as data use is controlled or restricted, an efficient data access management process has to be in place.