Data Management Discovery Workshop

Last updated: 28th Jan, 2020

Understanding what types of data you’re collecting as a research community and how that data moves through your design process can be a daunting task.

Whether you need to create documents to communicate your processes within your organisation, such as a Data Protection Policy, Data Retention Policy or even a Data Protection Impact Assessment - or write more accurate informed consent documents through which to manage those permissions - starting with an initial discovery and analysis of how it works right now gives you solid foundation to build from.

How this helps

The Data Management Discovery Workshop has been created as a more human approach to understanding the myriad of devices, software and processors that your research data moves through - helping you to see a clearer picture of how its done across your teams. Understand any potential risks you might and see how you could address any unmet needs.

Outcomes

  • A map of how data moves through your process
  • Understand and identify potential risks
  • Reflect as a team and think about how you might adapt
  • Write better policy documents and informed consent

What it looks like

What it looks like

What you need

Facilitator notes

Print one copy of the Data Management Discovery Cards for each person attending the workshop. You’ll need some scissors to cut them up in preparation for use.

You’ll need a room with tables with enough space for three people to map out their process. Take a look at the presentation to get an idea of how much space each group might need.

Ideally, you will also need access to a screen to view the slides with explanations and instructions, but you could use a laptop if one was not available or you were working with a smaller group.

If you need any assistance, or have any questions - get in touch or follow us on Twitter - we’re happy to help!

Download Data Discovery Workshop

Compliance and security as standard

Keeping your data compliant and safe. Find out more about how we handle information security.