Comments

Document Feedback - Review and Comment

Step 1 of 4: Comment on Document

How to make a comment?

1. Use this Protected Document to open a comment box for your chosen Section, Part, Heading or clause.

2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.

3. Do not open more than one comment box at the same time.

4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.

 

Important Information

During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will receive a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:

  1. DO NOT jump between web pages/applications while logging comments.

  2. DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.

  3. DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.

  4. DO NOT exit from the interface until you have completed all three stages of the submission process.

 

Implementing Data Protection Principles in Research Guidelines

Section 1 - Introduction

(1) Article 5 of the General Data Protection Regulation 2016 (GDPR) sets out the key principles underpinning data protection. Compliance with these fundamental principles of data protection is the first step for controllers in ensuring that they fulfil their obligations under the GDPR. 

(2) The following seven principles underpinning data protection are dealt with in the Personal Data and Records Policy:

  1. Lawfulness, Fairness and Transparency
  2. Purpose Limitation
  3. Data Minimisation
  4. Accuracy
  5. Storage Limitation
  6. Integrity and Confidentiality
  7. Accountability

Key Data Protection Terms in Research Context

(3) The following key data protection terms apply to this document:

  1. Data Controller
  2. Data Processor
  3. Data Subject
  4. Personal Data
  5. Special Category Data 
  6. Criminal Offence Data
  7. Identifiable Natural Person

Specific Considerations for Research

(4) Collecting personal data can be a large part of research collection. Consequently, it is important that safeguards are in place when conducting research in order to protect an individual’s personal data. Responsibility for implementation of data protection principles extends to students and supervisors in the course of placements and research.

(5) In the unlikely event that special category data is required to be collected, e.g. information related to an individual’s health, membership of a trade union, religion, political opinions and so on, additional protection is required to ensure data is not misused or disclosed to unauthorised parties. 

(6) Hibernia College student or Staff research projects are not authorised to process criminal offence data.

Exemptions to GDPR Principles for Research Purposes 

(7) Subject to the existence of appropriate safeguards, Article 89 of the GDPR sets out certain exemptions to the principles of data processing for research purposes. These exemptions are set out below, and the College may apply these exemptions with regard to personal data collected for research purposes, where necessary:

  1. Storage Limitation: Research data can be held for an indefinite period of time.  
  2. Purpose Limitation: Research data can be used for a purpose other than that it was originally intended for, provided that purpose is still research.
  3. Data Subject Rights: Certain exemptions as set out in Article 89 of the GDPR may apply with regard to data subject rights (see below).

(8) However, these exemptions are only applicable under the following circumstances:

  1. Where complying with the above provisions would prevent or seriously impair the purpose of processing.
  2. Data minimisation measures are implemented.
  3. Processing is not likely to cause substantial distress or damage to an individual.
  4. Processing is not used for specific measures or decisions about an individual.
  5. Research results are not available in a way which identifies individuals.

(9) In the context of the College’s research, these exemptions normally only apply to Staff and Faculty research. Students are not permitted to hold their data indefinitely or use research data for any other purpose other than it was originally intended. 

Top of Page

Section 2 - Important Points to Remember When Conducting Research

Be Aware

(10) Be aware of any personal data that you collect directly or indirectly during your studies and particularly during research, and ensure that all personal data is treated confidentiality and securely.

(11) Ensure that you familiarise yourself with the Personal Data and Records Policy and that you apply the data protection principles throughout your research.

Be Prepared

(12) Prior to collecting and analysing personal data, plan appropriate measures for data collection/disclosures in line with data protection principles and the Personal Data and Records Policy.

(13) Plan the resources you will require in advance and ensure you avail of College approved and/or College licensed IT resources where they are available.

(14) Permission must be sought to use any IT resources that have not been made available by the College.

Data Breaches

(15) If you suspect that a data breach has occurred, refer to the Personal Data Security Breach Management Procedure and contact the Records and Data Manager without delay.

(16) Avoid data breaches by following good data protection practices such as using bcc only if a group email is necessary and having a high-quality disposal routine, e.g. shredding sensitive files and disposing them in confidential waste where possible.

Data Pseudonymisation

(17) Pseudonymisation should be used where appropriate and a protected file containing the key identifying participations should be the only location where participants are identifiable in a dataset.

(18) Please find further guidance from the Data Protection Commission on anonymization and pseudonymisation here: https://www.dataprotection.ie/en/guidance-landing/anonymisation-and-pseudonymisation

Top of Page

Section 3 - Considerations for Virtual Face-to-Face Research

(19) A number of researchers have outlined the ethical implications of conducting research and collecting data in a virtual environment, including the use of videoconferencing for online interviews and focus groups, with a particular focus on the issues of consent and anonymity of participants. Rodham and Gavin (2006) concluded that ethical issues raised when planning and implementing online data collection are no different to those raised by more traditional approaches to data collection.

(20) The following points should be considered when preparing to conduct research online:

  1. Usual research guidelines and academic good practice apply in relation to consent and research participation. This includes, but is not limited to, the guidance and regulations as set out in the Academic Integrity and Good Practice Policy , the Research Handbook and BERA Guidelines for Ethical Guidelines for Educational Research
  2. Informed consent – ensure all participants provide explicit consent to taking part in the research and give their permission for the researcher to record, analyse and report any data collected. The researcher must make it explicit within their ethical application how informed consent will be obtained and recorded. 
  3. The use of online or other technological means can be problematic as individuals can potentially conceal their identity; however, this is not necessarily any different to the use of other methods of data collection such as surveys which are reliant on participants to provide honest answers. No matter what mechanism is used to facilitate data collection in research, the integrity of the researcher and participants is paramount. 
  4. Participants can have a misplaced expectation of privacy when using publicly available communication systems which are, by nature, mechanisms for the storage, transmission, and retrieval of comments. Consequently, when conducting research using any online medium, it is important that privacy is addressed explicitly in terms of storage, transmission and data access.