Skip to Main Content

Research Data Management

What is sensitive data?

‘Sensitive data’ refers to data that needs to be protected from unauthorised access or unwarranted disclosure. It is generally considered to be:

  • Identifiable data: Data that can be used to identify an individual, endangered species, object or location. This identification would increase potential risk of harm, discrimination, or unwanted attention. In Singapore, individual’s identifiable data is protected under the Personal Data Protection Act (PDPA) 2012.
  • Proprietary data: Data that is internally generated and gives competitive advantage to its owner. This includes research data with commercialisation potential. Proprietary data may be protected under copyright, patent, or trade secret laws.
  • Restricted or confidential data with contractual (e.g. Research Collaboration Agreements, Project Agreements, Material Transfer Agreements, Non-Disclosure Agreements) or legal obligations (e.g. Official Secrets Act). Click here to access NTU research agreement templates.

Best practices for handling sensitive data

It is recommended that you adopt a proportionate risk-based approach in handling sensitive data, throughout the data lifecycle:

  • Assess potential risks and consequences before commencing research
  • Outline data protection practices in the Data Management Plan (DMP)
  • Implement best practices within project teams/collaborators at the start and throughout research

For related information, see below:

Best practices for sharing sensitive data

Research data should wherever possible be made available for use by others in a manner consistent with relevant legal, ethical and disciplinary frameworks and norms. For sensitive data however, please see step-by-step guidance below before sharing:

  • Consider data ownership, ethical concerns, intellectual property rights and other legal terms for the data.

  • Factor in data sharing when obtaining consent from research participants:

    • In the information sheet, describe clearly who has access to the data during and after the project.

    • In the consent form, offer clear choices to participants on whether they agree with archiving and/or reuse of the data from the project. Note that a participant can opt out of these activities, but still participate in your study.

  • Consider ways to protect the sensitive data by:

    • Anonymisation or de-identification of identifiable data: For example, remove all direct identifiers, and remove or modify indirect identifiers until the risk of re-identification is negligible.

    • Redacting research data to remove confidential information or third party intellectual property.

    • Data encryption during data upload, download, and storage over secure platforms.

    • Managed access to ensure that only bona fide researchers bound by professional obligations and specific agreements have access to the data.

  • Do not share or store the 'keys' to re-identification with de-identified datasets.

  • Consider if embargoes need to be placed on the data. This would mean that the description of the dataset is published but the embargoed data files remains restricted until a specified time.

  • Publish your data and metadata according to participant consent and ethics approval, and apply appropriate license, taking into account any limitations on re-use, redistribution, commercial use, etc.

  • If your data can't be anonymised, consider publishing a description (i.e. the metadata) which enables you to place conditions around access to the data.

See example 1 and example 2 of de-identified datasets and how they are shared in real life.

Acts of anonymisation and aggregation render sensitive data non-linkable and therefore shareable. However, this may remove valuable information from the data. In some cases, therefore, instead of making sensitive data openly available, it may be preferable to release the data, on request, to other bone fide researchers using non-disclosure data sharing agreements, in addition to applying access control.


NTU guidelines for working with sensitive data

For NTU Principal Investigators:

Also refer to:

Video & Further Reading