There are a number of different mechanisms that can be used to control access to sensitive data; these are briefly discussed below:
These are not all mutually exclusive; in some instances, there may be multiple levels of request review (e.g., repository staff filter out unqualified or junk requests, forward serious requests to depositors for final approval).
The various forms of controlled access listed above can be divided into two groups based on who is setting the access policy. In some instances, repositories have standardized policies that apply across all datasets (e.g., someone must have PI status to access the data). In other instances, the depositor sets the policy. Note that this is related to, but slightly different from, who manages the policy (e.g., a depositor could prescribe a policy that a repository agrees to enforce).
In either instance, if you think that you will need to restrict access to data, it is highly recommended that you reach out to your unit's contact at the Office of Sponsored Projects (for sponsored projects) and/or Discovery to Impact (for commercializable items like patents). The university has a vested interest in (and shared responsibility for) many research outputs and should be consulted before entering into contractual obligations with third parties or establishing contracts/terms of use.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 Generic License.