  {"id":1093,"date":"2026-01-16T10:37:16","date_gmt":"2026-01-16T16:37:16","guid":{"rendered":"https:\/\/uwm.edu\/policy\/?post_type=library&#038;p=1093"},"modified":"2026-03-10T17:16:19","modified_gmt":"2026-03-10T22:16:19","slug":"research-data-management","status":"publish","type":"library","link":"https:\/\/uwm.edu\/policy\/library\/research-data-management\/","title":{"rendered":"Research Data Management"},"content":{"rendered":"\n<div class=\"uwm-l-row uwm-l-row--4\">\n<div class=\"uwm-l-col uwm-l-col--3\">\n<h2 class=\"wp-block-heading\" id=\"h-purpose\">Purpose<\/h2>\n<\/div>\n\n\n\n<div class=\"uwm-l-col\">\n<p>The purpose of this policy is to provide a general framework and expectations around research data and its stewardship, retention, accessibility, and security. In addition, this policy provides guidance on matters of research data transfer.<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"has-alpha-channel-opacity\" \/>\n\n\n\n<div class=\"uwm-l-row uwm-l-row--4\">\n<div class=\"uwm-l-col uwm-l-col--3\">\n<h2 class=\"wp-block-heading\" id=\"h-definitions\">Definitions<\/h2>\n<\/div>\n\n\n\n<div class=\"uwm-l-col\">\n<p><strong>Research:<\/strong> A systematic investigation, including research development, testing, and evaluation, designed to develop or contribute to a fuller scientific knowledge or understanding of the subject studied, and for the purposes of this policy, the systematic use of knowledge and understanding gained from research directed toward the production of useful materials, devices, systems, or methods, including the design and development of prototypes and processes.<\/p>\n\n\n\n<p><strong>Research Data:<\/strong> Records of research that are necessary for the reconstruction and evaluation of research results and the events and processes leading to those results, regardless of the form of the media on which they are recorded. For example, data may include writings, film\/videos, sound recordings, pictorial reproductions, drawings, designs, or other graphic representations, procedural manuals, forms, diagrams, workflow charts, equipment descriptions, data files, statistical records, and other research data. This definition pertains to both primary and secondary data. Details related to what information or material might constitute research data will depend on the specific federal regulations, sponsor requirements, and field of study applicable to a given research project.<\/p>\n\n\n\n<p><strong>Research Data Management:<\/strong> All actions contributing to the collection, organization, documentation, analysis, integrity, accuracy, security, retention, preservation, and sharing of research data.<\/p>\n\n\n\n<p><strong>Researcher:<\/strong> Any individual who creates, accesses, processes, enters, reads, deletes or otherwise uses research data including faculty, students, and staff.<\/p>\n\n\n\n<p><strong>Principal Investigator (PI):<\/strong> Lead or principal researcher on a given project.<\/p>\n\n\n\n<p><strong>Retention Period:<\/strong> The length of time research data must be retained following the dissemination of knowledge from research, the completion of a study, or the conclusion of a sponsored research agreement.<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"has-alpha-channel-opacity\" \/>\n\n\n\n<div class=\"uwm-l-row uwm-l-row--4\">\n<div class=\"uwm-l-col uwm-l-col--3\">\n<h2 class=\"wp-block-heading\" id=\"h-scope\">Scope<\/h2>\n<\/div>\n\n\n\n<div class=\"uwm-l-col\">\n<p>This policy applies to all faculty, staff, students, and other persons involved in the design, conduct, or reporting of research at the University of Wisconsin-Milwaukee (51ÁÔÆæ) or at facilities under the auspices of 51ÁÔÆæ, as well as the research data generated under the purview of 51ÁÔÆæ or with university resources.<\/p>\n\n\n\n<p>This policy describes the general expectations for 51ÁÔÆæ research data management. This policy does not supersede more restrictive research data management expectations of particular grants by federal agencies, other parties, or sponsors. Data exclusively related to teaching activities is generally excluded under this policy.<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"has-alpha-channel-opacity\" \/>\n\n\n\n<div class=\"uwm-l-row uwm-l-row--4\">\n<div class=\"uwm-l-col uwm-l-col--3\">\n<h2 class=\"wp-block-heading\" id=\"h-policy\">Policy<\/h2>\n<\/div>\n\n\n\n<div class=\"uwm-l-col\">\n<h3 class=\"wp-block-heading\" id=\"h-i-policy-statement\">I. Policy Statement<\/h3>\n\n\n\n<p>In compliance with applicable agreements, policies, regulations, and relevant federal and state laws, 51ÁÔÆæ research data shall be appropriately maintained in sufficient detail for an adequate period of time to meet the stewardship, retention, accessibility, and security expectations of external agencies and to facilitate the review and verification of research results.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-ii-roles-and-responsibilities\">II. Roles and Responsibilities<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The Principal Investigator (PI) is responsible for the stewardship and retention of research data and for initial determinations concerning access to and appropriate use of data.<\/li>\n\n\n\n<li>Other research contributors are responsible for cooperating with the PI in carrying out the requirements of this policy.<\/li>\n\n\n\n<li>The Dean of the college in which the PI is appointed will consider and provide written responses to appeals concerning issues of access to data and appropriate use of data.<\/li>\n\n\n\n<li>The Vice Provost for Research (VPR) will consider appeals to a Dean\u2019s determination concerning access to data and appropriate use of data. If the VPR reaches a different conclusion from the Dean, the VPR\u2019s decision is final and cannot be further appealed.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-iii-stewardship\">III. Stewardship<\/h3>\n\n\n\n<p>The PI is responsible for the collection and management of research data and is ultimately responsible for following best practices for managing research data. PIs must identify the research data management requirements for their projects and maintain an orderly system of data security, access, and retention according to applicable rules, regulations, policies, and\/or contractual agreements.<\/p>\n\n\n\n<p>If the PI leaves 51ÁÔÆæ prior to the end of the required data retention period, it is the responsibility of the PI\u2019s Dean to identify or designate ongoing stewardship responsibility.<\/p>\n\n\n\n<p>If a project does not have a named PI, the responsibilities for research data stewardship will rest with the Dean or their designee.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-iv-retention\">IV. Retention<\/h3>\n\n\n\n<p>Research data retention requirements can vary based on regulations, contractual agreements, funder, sponsor, publisher rules, or other 51ÁÔÆæ policies. It is the responsibility of the PI to<\/p>\n\n\n\n<p>determine the research data that needs to be retained under this policy and any other applicable rules, regulations, policies and\/or contractual agreements.<\/p>\n\n\n\n<p>If an obligatory retention period is not specified by another authority, 51ÁÔÆæ research data should be retained for a minimum of 4 years following the conclusion of a project, with the original data retained wherever possible.<\/p>\n\n\n\n<p>Research data must be retained on the 51ÁÔÆæ campus, or in facilities or services under the control of or contracted by 51ÁÔÆæ, unless specific permission to do otherwise is granted by the VPR. Research data will typically be retained in the unit where it was produced.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-v-access\">V. Access<\/h3>\n\n\n\n<p>PIs are responsible for managing contributors\u2019 access to research data and for meeting the data access and use requirements of sponsoring agencies. A basic expectation of this policy, however, is that each member of a research team should have reasonable access to the data and materials resulting from their work, unless otherwise previously agreed in writing.<\/p>\n\n\n\n<p>51ÁÔÆæ maintains the right to access all research data as specified in this policy, irrespective of whether any agreement includes specific provision for such access. The PI, upon request from their Dean, the VPR, the Public Records Custodian, or other responsible university official, must provide access to the relevant research data. Under extraordinary circumstances, such as in cases of research integrity or compliance concerns, the university will take necessary steps to safeguard the integrity of and access to data.<\/p>\n\n\n\n<p>None of these access provisions are intended to supersede a PI\u2019s right to keep data proprietary until the results of the research have been published and the aims of the research have been fulfilled.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-vi-research-data-transfer\">VI. Research Data Transfer<\/h3>\n\n\n\n<p>When researchers leave 51ÁÔÆæ or move to a different research group or position at 51ÁÔÆæ, they may take copies of the research data they have generated or to which they have made a substantial contribution, unless in conflict with other applicable rules, regulations, policies, and\/or contractual agreements. Original data, however, should be retained at 51ÁÔÆæ by the PI.<\/p>\n\n\n\n<p>If a PI leaves 51ÁÔÆæ, and a project is to be moved to another institution, the data may be transferred with the approval of the VPR and with written agreement from the PI\u2019s new institution.<\/p>\n\n\n\n<p>Research data that includes human subjects\u2019 data, controlled, restricted, or confidential information may not be transferred outside 51ÁÔÆæ without appropriate compliance review and written approval by the VPR.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-vii-security\">VII. Security<\/h3>\n\n\n\n<p>51ÁÔÆæ research data shall be maintained, classified, and protected according to <a href=\"https:\/\/www.wisconsin.edu\/regents\/policies\/information-technology-information-security\/\">UW System Regent Policy Document 25-5<\/a> and <a href=\"https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/information-security-data-classification-and-protection\/\">Administrative Policy 1031<\/a>.<\/p>\n\n\n\n<p>Research data that includes confidential information, proprietary information, controlled unclassified information (commonly referred to as \u201cCUI\u201d), or export-controlled information, requires consideration of additional security protections. It is the responsibility of the PI to identify the classification of their research data and to provide appropriate protections in<\/p>\n\n\n\n<p>accordance with applicable rules, laws, regulations, policies, and\/or contractual agreements.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-viii-interpretation-of-policy\">VIII.Interpretation of Policy<\/h3>\n\n\n\n<p>Questions on the interpretation of this policy may be directed to the VPR\/Office of Research.<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"has-alpha-channel-opacity\" \/>\n\n\n\n<div class=\"uwm-l-row uwm-l-row--4\">\n<div class=\"uwm-l-col uwm-l-col--3\">\n<h2 class=\"wp-block-heading\" id=\"h-referenced-or-related-policies\">Referenced or Related Policies<\/h2>\n<\/div>\n\n\n\n<div class=\"uwm-l-col\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/uwm.edu\/policy\/library\/uwm-policy-on-research-misconduct\/\">51ÁÔÆæ Policy on Research Misconduct 14-05<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/policy\/library\/uwm-export-controls-in-research-policy\/\">51ÁÔÆæ Export Controls in Research Policy 14-03<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/safety-health\/wp-content\/uploads\/sites\/405\/2022\/06\/Data-Storage-and-Security.pdf\">51ÁÔÆæ IRB Data Storage Guidelines (PDF)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/extramural-support-administration\/\">51ÁÔÆæ System Administrative Policy 342<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.wisconsin.edu\/regents\/policies\/information-technology-information-security\/\">UW System Regent Policy Document 25-5<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/copyrightable-instructions-materials-ownership-use-and-control\/\">UW System Administrative Policy 1310<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/inventions-and-patents\/\">UW System Administrative Policy 1315<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/information-security-data-classification-and-protection\/information-security-data-classification\/\">UW System Administrative Policy 1031<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/information-security-incident-response\/\">UW System Administrative Policy 1033<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.wisconsin.edu\/compliance\/download\/public_records(2)\/Universities-of-Wisconsin-Research-Records-Schedules.pdf\">UW System Research Project Records UWRSC035 (PDF)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.ecfr.gov\/current\/title-2\/subtitle-A\/chapter-II\/part-200\/subpart-D\/subject-group-ECFR4acc10e7e3b676f\/section-200.334\">2 C.F.R. 200, Subpart D, Record Retention and Access, \u00a7\u00a7 200.334 \u2013 200.338<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"author":1287,"parent":0,"menu_order":0,"template":"","meta":{"_acf_changed":false,"footnotes":"","uwm_wg_additional_authors":[]},"categories":[37,49],"topic":[30],"class_list":["post-1093","library","type-library","status-publish","hentry","category-administrative-policies-procedures","category-selected-academic-and-administrative-policies","topic-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Research Data Management - Policy Library<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/policy\/library\/research-data-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Research Data Management\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/policy\/library\/research-data-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Policy Library\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-10T22:16:19+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/policy\\\/library\\\/research-data-management\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/policy\\\/library\\\/research-data-management\\\/\",\"name\":\"Research Data Management - Policy Library\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/policy\\\/#website\"},\"datePublished\":\"2026-01-16T16:37:16+00:00\",\"dateModified\":\"2026-03-10T22:16:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/policy\\\/library\\\/research-data-management\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/policy\\\/library\\\/research-data-management\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/policy\\\/library\\\/research-data-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/policy\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research Data Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/policy\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/policy\\\/\",\"name\":\"Policy Library\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/policy\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/policy\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/policy\\\/#organization\",\"name\":\"University of Wisconsin - Milwaukee\",\"url\":\"https:\\\/\\\/uwm.edu\\\/policy\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/policy\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/0template-webid2\\\/wp-content\\\/uploads\\\/sites\\\/541\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/uwm.edu\\\/0template-webid2\\\/wp-content\\\/uploads\\\/sites\\\/541\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"width\":225,\"height\":224,\"caption\":\"University of Wisconsin - Milwaukee\"},\"image\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/policy\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Research Data Management - Policy Library","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/policy\/library\/research-data-management\/","og_locale":"en_US","og_type":"article","og_title":"Research Data Management","og_url":"https:\/\/uwm.edu\/policy\/library\/research-data-management\/","og_site_name":"Policy Library","article_modified_time":"2026-03-10T22:16:19+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/policy\/library\/research-data-management\/","url":"https:\/\/uwm.edu\/policy\/library\/research-data-management\/","name":"Research Data Management - Policy Library","isPartOf":{"@id":"https:\/\/uwm.edu\/policy\/#website"},"datePublished":"2026-01-16T16:37:16+00:00","dateModified":"2026-03-10T22:16:19+00:00","breadcrumb":{"@id":"https:\/\/uwm.edu\/policy\/library\/research-data-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/policy\/library\/research-data-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/policy\/library\/research-data-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/policy\/"},{"@type":"ListItem","position":2,"name":"Research Data Management"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/policy\/#website","url":"https:\/\/uwm.edu\/policy\/","name":"Policy Library","description":"","publisher":{"@id":"https:\/\/uwm.edu\/policy\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/policy\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uwm.edu\/policy\/#organization","name":"University of Wisconsin - Milwaukee","url":"https:\/\/uwm.edu\/policy\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uwm.edu\/policy\/#\/schema\/logo\/image\/","url":"https:\/\/uwm.edu\/0template-webid2\/wp-content\/uploads\/sites\/541\/2020\/11\/uwm-seo-logo.jpg","contentUrl":"https:\/\/uwm.edu\/0template-webid2\/wp-content\/uploads\/sites\/541\/2020\/11\/uwm-seo-logo.jpg","width":225,"height":224,"caption":"University of Wisconsin - Milwaukee"},"image":{"@id":"https:\/\/uwm.edu\/policy\/#\/schema\/logo\/image\/"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/uwm.edu\/policy\/wp-json\/wp\/v2\/library\/1093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/policy\/wp-json\/wp\/v2\/library"}],"about":[{"href":"https:\/\/uwm.edu\/policy\/wp-json\/wp\/v2\/types\/library"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/policy\/wp-json\/wp\/v2\/users\/1287"}],"version-history":[{"count":11,"href":"https:\/\/uwm.edu\/policy\/wp-json\/wp\/v2\/library\/1093\/revisions"}],"predecessor-version":[{"id":5043,"href":"https:\/\/uwm.edu\/policy\/wp-json\/wp\/v2\/library\/1093\/revisions\/5043"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/policy\/wp-json\/wp\/v2\/media?parent=1093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uwm.edu\/policy\/wp-json\/wp\/v2\/categories?post=1093"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/uwm.edu\/policy\/wp-json\/wp\/v2\/topic?post=1093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}