There are three data sharing policies that you need to know about
1. Funder Polices - Many funders now have data sharing requirement. For instance, for the RCUK data sharing is mandatory. Policies also exist for EU funded research and the Wellcome Trust. It is however best to check with your funders
2. Aston University Research Data Policy - Aston has its own research data policy which applies to all research data produced whether funded or unfunded. In most cases, Aston policy will complement funder policies so if you meet one you meet the other. Aston policy is recommended for good research practice.
3. Journal Policies - An increasing number of journal are requiring the underlying data forming part of a publication to be shared e.g PLOS ONE
1. Data which underpins your publications e.g raw data, processed data, data behind figures
2. Unpublished data (some funders) which has potential long term value e.g data produced during high volume experimentation, low throughput data produced over a long time
3. Physical data - which forms a part of points 1 or 2 above
All publications require a Data Access Statement (RCUK & Aston Policy) which needs a permanent identifier called a DOI (Digital Object Identifier). This Data Access Statement is required to be in your publication prior to submission. For this reason, the metadata describing your data needs to be uploaded into Aston Data Explorer prior to submission. The data itself can be uploaded onto Aston Data Explorer anytime prior to online publication.
Some funders also require data which you do not intend to use as a part of a publication to be shared. For the EPSRC, the metadata should as a minimum be available at a maximum of 12 months following data creation or 12 months following the end of the research grant.
A license type must be selected which determines how your data can be reused following sharing. This is undertaken on Aston Data Explorer. To maximise the impact of your research, it is advised that one of the more liberal licenses is selected. If needs be, more restrictive licenses can be applied to more sensitive data.
Image courtesy of fotor.com