1.1Type of study1.2Types of data1.3Format and scale of the data1Description of the data2.1Methodologies for data collection / generationHow the data will be collected/generated and which community data standards (if any) will be used at this stage.2.2Data quality and standardsHow consistency and quality of data collection / generation will be controlled and documented, through processes of calibration, repeat samples or measurements, standardised data capture or recording, data entry validation, peer review of data or representation with controlled vocabularies.2Data collection / generationMake sure you justify why new data collection or long term management is needed in your Case for Support. Focus in this template on the good practice and standards for ensuring new data are of high quality and processing is well documented3.1Managing, storing and curating data3.2Metadata standards and data documentationWhat metadata is produced about the data generated from the research/innovation? For example, descriptions of data that enable research/innovation data to be used by others outside of your own team. This may include documenting the methods used to generate the data, analytical and procedural information, capturing instrument metadata alongside data, documenting provenance of data and their coding, detailed descriptions for variables, records,etc.3.3Data preservation strategy and standards3Data management, documentation and curation4.1Formal information/data security standards4.2Main risks to data securityAll personal data has an element of risk. Summarise the main risks to the confidentiality and security of information related to human participants, the level of risk and how these risks will be managed. Cover the main processes or facilities for storage and processing of personal data, data access, with controls put in place and any auditing of user compliance with consent and security conditions. It is not sufficient to write not applicable under this heading4Data security and confidentiality of potentially disclosive informationThis section MUST be completed if your data includes personal data relating to human participants. For other research/innovation, the safeguarding and security of data should also be considered. Information provided will be in line with your ethical review. Please note this section concerns protecting the data, not the patients.5.1Suitability for sharing5.2Restrictions or delays to sharing, with planned actions to limit such restrictionsRestriction to data sharing may be due to participant confidentiality, consent agreements or IPR. Strategies to limit restrictions may include data being anonymised or aggregated; gaining participant consent for data sharing; gaining copyright permissions. For prospective studies, consent procedures should include provision for data sharing to maximise the value of the data for wider research/innovation use, while providing adequate safeguards for participants.5.3Discovery by potential users of the research/innovation dataIndicate how potential new users (outside of your organisation) can find out about your data and identify whether it could be suitable for their research/innovation purposes, e.g. through summary information (metadata) being readily available on the study website or in databases or catalogues.5.4Governance of accessIdentify who makes or will make the decision on whether to supply the data to a potential new user. Indicate whether the data will be deposited in and available from an identified community database, repository, archive or other infrastructure established to curate and share data.5.5The study team’s exclusive use of the dataUKRI’s requirement is for timely data sharing, with the understanding that a limited, defined period of exclusive use of data for primary research/innovation is reasonable according to the nature and value of the data, and that this restriction on sharing should be based on simple, clear principles.5.6Regulation of responsibilities of users5Data sharing and access6Responsibilities7Relevant institutional, departmental or study policies on data sharing and data security8Author of this Data Management Plan (Name) and, if different to that of the Principal Investigator, their telephone & email contact details