Skip to main content

Research Data Management


access control

 Access control is the selective restriction or permission of access to a location (physical or virtual) or resource (research data).


 Direct identifiers are removed and/or decoded so that individuals cannot be identified.

 backup and recovery

 Procedures used in protecting research data against data loss and in reconstructing the research data after any kind of data loss.

copyright issues

Copyright may apply to research materials and data used in research and may play a role when creating, sharing and reusing data.

data interoperability

Data interoperability is the process that allows the sharing of data between different organisations or researchers.  Its purpose is to create a shared understanding of data. 

data quality control 

During data collection, processing and analysis, the researcher ensures that the data reflect  actual facts, responses, observations and events. 

data reuse

The use of data collected or produced prior to the current project. Existing data may have been collected for research or non-research purposes.

existing data 

Data collected prior to the current project, for research or non-research purposes by others or by the current researcher.

informing research participants

Process of informing research participants and getting permissions before conducting research on them.


Intellectual property rights (IPR) are the protection granted to the creators of IP, and include e.g  copyright and patents.



Describes the terms according which material or data can be reused, archived, re-distributed etc. Permissions are authorised or denied by the licensor, i.e. the owner or the producer of the data.

long-term preservation

Long-term preservation (LTP) requires a strategy which will ensure that your data can be found, read, opened and used in the future. In order to meet these requirements data needs to be actively curated while preserved for a long period (over 15 years) of time. 



Metadata describes the basic characteristics of the data, e.g.:
who created it,
what the data file contains
when, where, why and how the data were generated. Metadata elements usually include the origin, purpose, date, time coverage, geographic location, creator, access, and terms of use of the data. By using standardised metadata you ensure that the data can be fully understood and reused in the future.

metadata standards

Metadata standard refers to a standardised metadata schema which is approved by an official standardisation institution such as the International Organization for Standardization (ISO).

network drives

A shared online disk space where users can store and share files.

open standards

An open standard is a standard that is publicly available and can be implemented on a royalty-free basis. 

persistent identifiers (PID)

A persistent identifier is a reference to a digital object. A PID contains information about the object regardless of what happens to it even if its online location changes.

 cc by Casrai

personal or sensitive information

Any information that could potentially identify a specific individual. Sensitive personal information may include details e.g. regarding the medical, ethnic, cultural or socioeconomic background of a person.

cc by Casrai

privacy protection

The protection of the participants' identities, e.g. via anonymisation or by managing access control.

standard data collection methods

You need to know how the data were collected to be able to derive conclusions from it, i.e. you need to know the method(s) of data collection (e.g. census, sample survey, experiment, observational study). In the context of data collection, standardisation refers to the collection of data in a manner that enables easy comparisons.

third party data

Third party data is any information collected by an entity that does not have a direct relationship with the user the data is being collected on. Third party data is often collected for commercial purposes and is usually licenced or purchased.

version control

Management of changes in data. Ideally, each revision is associated with a timestamp and the person making the change. Revisions can be compared, restored, and with some types of files, merged.

Terms related to research data management, by Mari Elisa Kuusniemi, last modified by Jari Friman on 30.5.2017, the University of Helsinki.

Frequently asked questions

1. Where can I start with my data management?

Follow the stages outlined in Data management process at Hanken. These concrete stages offer Hanken students and researchers, respectively, a comprehensive and thorough guide that you can trace the whole data management process easily, clearly, and closely.

Researchers can also start with writing a data management plan (DMP). Data management starts already in the research planning stage. In this stage, researchers should write a data management plan and complete the checklist that covers the whole data management process. See  DMP guides and checklist.

2. What are the must-dos for my data management?

As Hanken students and researchers, you are responsible for complying with good data management practices that include Hanken's ethical research guidelines on data protection, data security, and data sharing based on legislation and research integrity. You need to:

  1. Fill in data processing description. All Hanken researchers and students need to fill in Record of data processing activities forms. Students use the e-form Record of data processing activities for students. Researchers and PhD students can write up a Record of data processing activities simultaneously when you write up a Data Management Plan (DMP) with the DMPTuuli tool, with Hanken’s template (See DMPTuuli with Hanken's DMP guidance and DMP template). In other words, the DMP you create with DMPTuuli (Hanken’s template) serves at the same time as a Record of Data Processing Activities, which you can share with participants/subjects/respondents of your research, too (if they ask for it). 
  2. You need to fill in the ethical review request e-form and submit to Hanken’s Research Ethics Committee if your study is one of the six types described in Ethical review.
  3. You need to inform your research participants if you collect personal data from them or if the personal data are received from a source other than the research participants. Modify the consent message templates to inform your research participants.
  4. Store and back up data securely during research. Use data storage services provided and maintained by Hanken. See Data storage and backup.

Note that there are different data management processes with different instructions and must-dos for BSc/MSc/eMBA students and for researchers and PhD students. See these two processes outlined in Data management process at Hanken.