Many funders and journals have data sharing policies and require researchers to deposit research data, code, and products to public repositories. This can increase the reproducibility and transparency of research. JHU Data Services is here to help you comply with funders’ and publishers’ requirements to share data. We can help you find a data repository to share your data or help you deposit data in our institutional repository, Johns Hopkins Research Data Repository.

Consult

Email dataservices@jhu.edu if you need help with finding a data repository to share data, preparing data for sharing (e.g. de-identifying human participant data, creating documentation, etc.), or depositing data on Johns Hopkins Research Data Repository.

We help with

De-identification

Do you have human participants in your research? Do you need to remove sensitive information (Protected Health Information or Personal Identifiable Information) from your data so you can share them? We offer workshops and online guidance to help you de-identify your data. You can also contact us to schedule a consult to learn more.

Data Sharing

Does your funder has a data sharing policy? Do you need to share data while submitting your manuscript to a journal? Do you need a DOI (digital object identifier) for your dataset? You can deposit your data on Johns Hopkins Research Data Repository and we will mediate the process. Or we can help you find a data repository to deposit your data.

Webinars

Data Services offers a number of workshops for learning data management and sharing, and de-identifying human participant data for sharing purposes each semester.

Best Practices for Data Management and Sharing

An overview of best practices for data management including backup procedures, tips on effective file names, data security and access controls, and data documentation/metadata.

Protecting Human Subject Data Privacy: an Introduction

An overview of common privacy disclosure risks from personal and health identifiers in data.

Protecting Human Subject Data Privacy Part II: De-identification Techniques

This class builds upon the introductory session on privacy protection for shared data, as a next step toward applying techniques for de-identifying several types of personal and health identifiers.


Learn

Visit our Data Management and Sharing Guide to learn how to properly manage and share your data so your research can be organized and reproducible. To learn how to protect the privacy of human participants while sharing data, check out our Protecting and Removing Personal and Health Identifiers Guide. If you write code for your research and want to document and share your scripts/software, check out self-paced training about Planning for Software Reproducibility and Reuse, and A Toolbox for Curating and Archiving Research Software for Data Management Specialists.

Services we do not cover

  • De-identify research data
  • Provide expert determination for de-identified data
  • Create documentation for research data