TY - JOUR AU - Cooke, Steven, J AB - Abstract Surveillance of animal movements using electronic tags (i.e., biotelemetry) has emerged as an essential tool for both basic and applied ecological research and monitoring. Advances in animal tracking are occurring simultaneously with changes to technology, in an evolving global scientific culture that increasingly promotes data sharing and transparency. However, there is a risk that misuse of biotelemetry data could increase the vulnerability of animals to human disturbance or exploitation. For the most part, telemetry data security is not a danger to animals or their ecosystems, but for some high-risk cases, as with species’ with high economic value or at-risk populations, available knowledge of their movements may promote active disturbance or worse, potential poaching. We suggest that when designing animal tracking studies it is incumbent on scientists to consider the vulnerability of their study animals to risks arising from the implementation of the proposed program, and to take preventative measures. Large numbers of animals, from insects to whales, are now tracked using electronic tags as they move over land, through air, and in water (i.e., biotelemetry and biologging; Hussey et al. 2015, Kays et al. 2015, Wilmers et al. 2015; called animal tracking data in the present article). Electronic tags can transmit or log data about animal movement, imagery (i.e., from onboard cameras), or physiological state, allowing four-dimensional movement path reconstructions, sometimes in real time (box 1; Hussey et al. 2015). Animal tracking data have multiple applications, including documenting fundamental aspects of a species’ ecology, discovering new migratory corridors or breeding sites, and remotely monitoring their environment (Raymond et al. 2015, Treasure et al. 2017, Brodie et al. 2018, Goulet et al. 2019). As a result, electronic tracking tools are now relied on for animal conservation and management efforts (Cooke 2008, Brooks et al. 2018, Crossin et al. 2017, Hays et al. 2019), for the spatial planning of human activities and infrastructure, and for improving the forecasts provided by oceanographic models (Allen and Singh 2016, Lennox et al. 2019, McGowan et al. 2017, Harcourt et al. 2019). Box 1. Types of animal location and movement data collected by tracking studies in relation to potential threats (e.g., poaching, harassing) of telemetered animals, and security measures that should be considered depending on whether the species is valued, vulnerable, visible, or fragile. Real-time data. Data on animal location can be immediately available to investigators by manual tracking or via automatic uplink from tags or receivers to databases. Direct interception of tag transmissions by outside parties or sharing real-time data on social media or websites could severely imperil tagged animals that are valuable and vulnerable. Near real-time data. Data offloaded from receivers that log proximate tags (e.g., PIT tags, acoustic tags) and remotely downloaded GPS units provide insight into recent (but not current) tagged animal location or activity within a detection radius (usually less than 100 meters). Interception of receivers and data offloading with compatible software by outside parties can provide last-known locations of tagged animals in an area that could be misused. Archived data. Data archived in open databases or published as maps in scientific papers or reports can provide general characteristics on individual or population locations and movement patterns. There are varying degrees of security issues on archived data: databases or publications can be publicly available or open access or can be protected (e.g., by a password), or data release can be embargoed for a specified period (governed by an approved data management plan), depending on the associated magnitude of risk to the study animal or to the study itself. Many commercial industries rely on the known occurrence or availability of animals and benefit from knowledge of their movements, creating an incentive for using tracking data. For example, professional ecotourism operators are dependent on access to their target species to satisfy their customers (e.g., Hayward et al. 2012, Fraser et al. 2014), whereas commercial fishers can maximize fishing effort with improved knowledge of species distributions, and aqua- or agriculturists may wish to track the presence of wild animals around their livestock. These stakeholder interests do not necessarily coincide with the primary research or conservation objectives that were the impetus for the tracking study, creating the potential for conflict (Hartter et al. 2013). The potential value of animal tracking data to conflicting parties has resulted in concerns that the data could be misused and a recognition that researchers, as stewards of their data, require information about best practice before, during, and following the implementation of an animal tracking study (Cooke et al. 2017b). Data sharing and communication are critical components of the scientific process, providing access to a wealth of knowledge that opens new and robust avenues of inquiry (Nguyen et al. 2017). However, sharing data openly could also increase the vulnerability of animals to disturbance through unintended data use by bad actors. Data security breaches may ultimately compromise the welfare of wild animals and the recovery of imperiled species. Open science and communication are critical to successful research (Merton 1973), but data are sometimes embargoed to protect sensitive information (Kempner et al. 2011). With emerging concerns over the potential misuse of animal tracking data (Stuart et al. 2006, Lindenmeyer and Scheele 2017, Cooke et al. 2017b), we believe that the research community will benefit from support in decision-making and information on best practices for handling potentially sensitive animal tracking cases. We briefly discuss the potential risks that animals are exposed during tracking studies. We then review existing protocols and infrastructure within animal tracking science available to researchers for protecting sensitive data. Finally, we present decision-making tools to assist researchers to develop appropriate data management plans and if necessary, instigate mitigation measures prior to a tracking study. Risks associated with animal tracking The scale of tracking data misuse is presently difficult to establish, with only a cases having been reported (see table 1; Meeuwig et al. 2015, Cooke et al. 2017b, Frey et al. 2017a). Nonetheless, it is evident there are potential problems that need to be addressed (Cooke et al. 2017b, Tulloch et al. 2018). Data can either be intercepted directly from tracking hardware by physically breaching the equipment or indirectly by reading results or accessing databases, maps, public outreach websites, or published accounts of animal movements (i.e., published scientific reports and papers). Receivers provide the position of tagged individuals by detecting signals transmitted by radio, acoustic, or satellite transmitters attached to animals (table 2). If proper security precautions are not taken, the data could be intercepted by individuals possessing compatible receivers that listen for tagged animals in a study area or could be downloaded directly from stationary receivers if they are not secured (Meeuwig et al. 2015). Indeed, it is possible for the public to purchase radio or acoustic receivers or goninometers off the shelf that can locate radio, acoustic, or satellite tagged animals. Wildlife photographers could do so, bringing their own radio receivers with them to locate tagged animals (Cooke et al. 2017b). Satellite and GSM tags log data onboard and then transmit it to compatible satellites or cell phone towers, which then relay the data so that is accessible via password protected Internet portals or applications. Interception of these satellite coded signals of animal movement patterns is unlikely and is only possible if an actor owns a field receiver and can actively detect the tag. Table 1. Examples of how animal tracking data could be misused, exposing tagged animals (and populations containing tagged individuals) to disturbance or exploitation. Data source . Example of misuse . Possible preventative measures . Transmissions from animal tag actively accessed by public to locate animal Photographer acquires tracking hardware to locate and follow tagged animals and disturbs or harms them while trying to obtain pictures Manufacturer encrypts transmitted data Manufacturers of tags could be required to pass an independent security review and their tag make and model be openly listed as assessed and assured to follow best practices Public acquires positional data from published maps or databases of animal distributions. Journal articles or public reports showing maps of rare species Occurrences used by poacher to target the animal Journal has policies in place recognizing the need to restrict access to sensitive information about animal distributions Decrease resolution of images and maps Access to information request filed by citizen for data from publicly funded study Poachers access data to illegally harvest animals Government regulations limit the accessibility of animal movement data to the public or punish misuse of the information Database has embargoes to restrict availability of certain sensitive data Public purchases tags for vigilantism Pastoralists trap and fit radio collars to Judas animals to find and eradicate what they perceive to be nuisance species This would violate the requirement of a scientific collection permit instituted by most governments, requirement of relevant ACC documents for equipment purchase Government uses tag data to target ‘problematic’ individuals Tag data provided by researchers is used to track ‘problematic’ animals to define movement corridors or target individuals for culling Memorandum of understanding with researcher Legislated protection through animal ethics authority Biomimetic sonar tags scanning prey fields in front of predatory marine animals Tags deployed to sample marine biological data could be intercepted for finding fisheries resources or misinterpreted as surveillance or spying equipment Data encryption onboard tags International agreements regarding jurisdiction and sampling opportunities for scientific research Data source . Example of misuse . Possible preventative measures . Transmissions from animal tag actively accessed by public to locate animal Photographer acquires tracking hardware to locate and follow tagged animals and disturbs or harms them while trying to obtain pictures Manufacturer encrypts transmitted data Manufacturers of tags could be required to pass an independent security review and their tag make and model be openly listed as assessed and assured to follow best practices Public acquires positional data from published maps or databases of animal distributions. Journal articles or public reports showing maps of rare species Occurrences used by poacher to target the animal Journal has policies in place recognizing the need to restrict access to sensitive information about animal distributions Decrease resolution of images and maps Access to information request filed by citizen for data from publicly funded study Poachers access data to illegally harvest animals Government regulations limit the accessibility of animal movement data to the public or punish misuse of the information Database has embargoes to restrict availability of certain sensitive data Public purchases tags for vigilantism Pastoralists trap and fit radio collars to Judas animals to find and eradicate what they perceive to be nuisance species This would violate the requirement of a scientific collection permit instituted by most governments, requirement of relevant ACC documents for equipment purchase Government uses tag data to target ‘problematic’ individuals Tag data provided by researchers is used to track ‘problematic’ animals to define movement corridors or target individuals for culling Memorandum of understanding with researcher Legislated protection through animal ethics authority Biomimetic sonar tags scanning prey fields in front of predatory marine animals Tags deployed to sample marine biological data could be intercepted for finding fisheries resources or misinterpreted as surveillance or spying equipment Data encryption onboard tags International agreements regarding jurisdiction and sampling opportunities for scientific research Note: The Examples are hypothetical but are representative of possible scenarios in which security could be breached. For documented cases of animal tracking data misuse, see Meeuwig et al. 2015, Cooke et al. 2017b, Frey et al. 2017a. Open in new tab Table 1. Examples of how animal tracking data could be misused, exposing tagged animals (and populations containing tagged individuals) to disturbance or exploitation. Data source . Example of misuse . Possible preventative measures . Transmissions from animal tag actively accessed by public to locate animal Photographer acquires tracking hardware to locate and follow tagged animals and disturbs or harms them while trying to obtain pictures Manufacturer encrypts transmitted data Manufacturers of tags could be required to pass an independent security review and their tag make and model be openly listed as assessed and assured to follow best practices Public acquires positional data from published maps or databases of animal distributions. Journal articles or public reports showing maps of rare species Occurrences used by poacher to target the animal Journal has policies in place recognizing the need to restrict access to sensitive information about animal distributions Decrease resolution of images and maps Access to information request filed by citizen for data from publicly funded study Poachers access data to illegally harvest animals Government regulations limit the accessibility of animal movement data to the public or punish misuse of the information Database has embargoes to restrict availability of certain sensitive data Public purchases tags for vigilantism Pastoralists trap and fit radio collars to Judas animals to find and eradicate what they perceive to be nuisance species This would violate the requirement of a scientific collection permit instituted by most governments, requirement of relevant ACC documents for equipment purchase Government uses tag data to target ‘problematic’ individuals Tag data provided by researchers is used to track ‘problematic’ animals to define movement corridors or target individuals for culling Memorandum of understanding with researcher Legislated protection through animal ethics authority Biomimetic sonar tags scanning prey fields in front of predatory marine animals Tags deployed to sample marine biological data could be intercepted for finding fisheries resources or misinterpreted as surveillance or spying equipment Data encryption onboard tags International agreements regarding jurisdiction and sampling opportunities for scientific research Data source . Example of misuse . Possible preventative measures . Transmissions from animal tag actively accessed by public to locate animal Photographer acquires tracking hardware to locate and follow tagged animals and disturbs or harms them while trying to obtain pictures Manufacturer encrypts transmitted data Manufacturers of tags could be required to pass an independent security review and their tag make and model be openly listed as assessed and assured to follow best practices Public acquires positional data from published maps or databases of animal distributions. Journal articles or public reports showing maps of rare species Occurrences used by poacher to target the animal Journal has policies in place recognizing the need to restrict access to sensitive information about animal distributions Decrease resolution of images and maps Access to information request filed by citizen for data from publicly funded study Poachers access data to illegally harvest animals Government regulations limit the accessibility of animal movement data to the public or punish misuse of the information Database has embargoes to restrict availability of certain sensitive data Public purchases tags for vigilantism Pastoralists trap and fit radio collars to Judas animals to find and eradicate what they perceive to be nuisance species This would violate the requirement of a scientific collection permit instituted by most governments, requirement of relevant ACC documents for equipment purchase Government uses tag data to target ‘problematic’ individuals Tag data provided by researchers is used to track ‘problematic’ animals to define movement corridors or target individuals for culling Memorandum of understanding with researcher Legislated protection through animal ethics authority Biomimetic sonar tags scanning prey fields in front of predatory marine animals Tags deployed to sample marine biological data could be intercepted for finding fisheries resources or misinterpreted as surveillance or spying equipment Data encryption onboard tags International agreements regarding jurisdiction and sampling opportunities for scientific research Note: The Examples are hypothetical but are representative of possible scenarios in which security could be breached. For documented cases of animal tracking data misuse, see Meeuwig et al. 2015, Cooke et al. 2017b, Frey et al. 2017a. Open in new tab Table 2. Telemetry tag technologies used to generate animal movement data on air, land, and in water. Telemetry technology . Brief description . Vulnerability to direct misuse . Passive integrated transponders (PIT tags) Small radio frequency identification (RFID) tags with a unique ID code that can be deciphered by an electronic reader generally only from very short distances (less than a meter). For example, in aquatic environments, battery-powered cables can be laid across a riverbed to monitor the passage of tagged fish Low. Inexpensive technology (approximately the cost of a receiver) and limited range of receivers to detect tags. Radio transmitters Implantable or attachable devices that send signals across various radio frequencies, typically detected from 100 s or 1000 s of meters away. High. Receivers require modest investment ($500–$1000) and location methods are simple. Enthusiasts may locate radio tagged animals by intercepting signals that are not encrypted. Acoustic transmitters Implantable or attachable infrasonic tags for aquatic research whose unique sequence of transmissions is decoded by a hydrophone receiver High. Receivers are inexpensive (approximately $2000 each) and easy to use, requiring little preexisting knowledge. No data encryption. Satellite beacons Attachable devices that record location Doppler or GPS and transmit results through satellite, cell phone, or ad hoc networks. Low. Tags are high cost and transmissions can be difficult to intercept. Digital databases where transmissions are stored are usually password protected, requiring approval to gain access. Goninometers to locate satellite tags are expensive and would be difficult to use without knowledge of where the tag popped off, but could be used to find animals with tags (e.g., polar bears). Geolocation loggers Implantable or attachable devices measuring environmental variables (e.g., ambient light, depth, temperature) to estimate the position of the tag Low. Requires interception of the physical tag itself to offload data, at which point the animal would have already been captured or have moved away from the location (i.e., because tags that pop off after a predetermined period of time). Location quality is poor and methods to estimate it from sensor data are complicated. Biomimetic sonar tags Attachable devices used to scan prey fields available to aquatic animals High. Sonar used by these tags could be misinterpreted as surveillance or spying equipment if detected by certain stakeholders. Telemetry technology . Brief description . Vulnerability to direct misuse . Passive integrated transponders (PIT tags) Small radio frequency identification (RFID) tags with a unique ID code that can be deciphered by an electronic reader generally only from very short distances (less than a meter). For example, in aquatic environments, battery-powered cables can be laid across a riverbed to monitor the passage of tagged fish Low. Inexpensive technology (approximately the cost of a receiver) and limited range of receivers to detect tags. Radio transmitters Implantable or attachable devices that send signals across various radio frequencies, typically detected from 100 s or 1000 s of meters away. High. Receivers require modest investment ($500–$1000) and location methods are simple. Enthusiasts may locate radio tagged animals by intercepting signals that are not encrypted. Acoustic transmitters Implantable or attachable infrasonic tags for aquatic research whose unique sequence of transmissions is decoded by a hydrophone receiver High. Receivers are inexpensive (approximately $2000 each) and easy to use, requiring little preexisting knowledge. No data encryption. Satellite beacons Attachable devices that record location Doppler or GPS and transmit results through satellite, cell phone, or ad hoc networks. Low. Tags are high cost and transmissions can be difficult to intercept. Digital databases where transmissions are stored are usually password protected, requiring approval to gain access. Goninometers to locate satellite tags are expensive and would be difficult to use without knowledge of where the tag popped off, but could be used to find animals with tags (e.g., polar bears). Geolocation loggers Implantable or attachable devices measuring environmental variables (e.g., ambient light, depth, temperature) to estimate the position of the tag Low. Requires interception of the physical tag itself to offload data, at which point the animal would have already been captured or have moved away from the location (i.e., because tags that pop off after a predetermined period of time). Location quality is poor and methods to estimate it from sensor data are complicated. Biomimetic sonar tags Attachable devices used to scan prey fields available to aquatic animals High. Sonar used by these tags could be misinterpreted as surveillance or spying equipment if detected by certain stakeholders. Note: Different tags have unique benefits and drawbacks that researchers must consider when designing a study. One key consideration is the potential for direct misuse by data poachers (i.e., signal interception). All technologies have equal vulnerability to indirect misuse (i.e., viewing of data archived in open databases or visualized on published maps). Open in new tab Table 2. Telemetry tag technologies used to generate animal movement data on air, land, and in water. Telemetry technology . Brief description . Vulnerability to direct misuse . Passive integrated transponders (PIT tags) Small radio frequency identification (RFID) tags with a unique ID code that can be deciphered by an electronic reader generally only from very short distances (less than a meter). For example, in aquatic environments, battery-powered cables can be laid across a riverbed to monitor the passage of tagged fish Low. Inexpensive technology (approximately the cost of a receiver) and limited range of receivers to detect tags. Radio transmitters Implantable or attachable devices that send signals across various radio frequencies, typically detected from 100 s or 1000 s of meters away. High. Receivers require modest investment ($500–$1000) and location methods are simple. Enthusiasts may locate radio tagged animals by intercepting signals that are not encrypted. Acoustic transmitters Implantable or attachable infrasonic tags for aquatic research whose unique sequence of transmissions is decoded by a hydrophone receiver High. Receivers are inexpensive (approximately $2000 each) and easy to use, requiring little preexisting knowledge. No data encryption. Satellite beacons Attachable devices that record location Doppler or GPS and transmit results through satellite, cell phone, or ad hoc networks. Low. Tags are high cost and transmissions can be difficult to intercept. Digital databases where transmissions are stored are usually password protected, requiring approval to gain access. Goninometers to locate satellite tags are expensive and would be difficult to use without knowledge of where the tag popped off, but could be used to find animals with tags (e.g., polar bears). Geolocation loggers Implantable or attachable devices measuring environmental variables (e.g., ambient light, depth, temperature) to estimate the position of the tag Low. Requires interception of the physical tag itself to offload data, at which point the animal would have already been captured or have moved away from the location (i.e., because tags that pop off after a predetermined period of time). Location quality is poor and methods to estimate it from sensor data are complicated. Biomimetic sonar tags Attachable devices used to scan prey fields available to aquatic animals High. Sonar used by these tags could be misinterpreted as surveillance or spying equipment if detected by certain stakeholders. Telemetry technology . Brief description . Vulnerability to direct misuse . Passive integrated transponders (PIT tags) Small radio frequency identification (RFID) tags with a unique ID code that can be deciphered by an electronic reader generally only from very short distances (less than a meter). For example, in aquatic environments, battery-powered cables can be laid across a riverbed to monitor the passage of tagged fish Low. Inexpensive technology (approximately the cost of a receiver) and limited range of receivers to detect tags. Radio transmitters Implantable or attachable devices that send signals across various radio frequencies, typically detected from 100 s or 1000 s of meters away. High. Receivers require modest investment ($500–$1000) and location methods are simple. Enthusiasts may locate radio tagged animals by intercepting signals that are not encrypted. Acoustic transmitters Implantable or attachable infrasonic tags for aquatic research whose unique sequence of transmissions is decoded by a hydrophone receiver High. Receivers are inexpensive (approximately $2000 each) and easy to use, requiring little preexisting knowledge. No data encryption. Satellite beacons Attachable devices that record location Doppler or GPS and transmit results through satellite, cell phone, or ad hoc networks. Low. Tags are high cost and transmissions can be difficult to intercept. Digital databases where transmissions are stored are usually password protected, requiring approval to gain access. Goninometers to locate satellite tags are expensive and would be difficult to use without knowledge of where the tag popped off, but could be used to find animals with tags (e.g., polar bears). Geolocation loggers Implantable or attachable devices measuring environmental variables (e.g., ambient light, depth, temperature) to estimate the position of the tag Low. Requires interception of the physical tag itself to offload data, at which point the animal would have already been captured or have moved away from the location (i.e., because tags that pop off after a predetermined period of time). Location quality is poor and methods to estimate it from sensor data are complicated. Biomimetic sonar tags Attachable devices used to scan prey fields available to aquatic animals High. Sonar used by these tags could be misinterpreted as surveillance or spying equipment if detected by certain stakeholders. Note: Different tags have unique benefits and drawbacks that researchers must consider when designing a study. One key consideration is the potential for direct misuse by data poachers (i.e., signal interception). All technologies have equal vulnerability to indirect misuse (i.e., viewing of data archived in open databases or visualized on published maps). Open in new tab Following study completion, animal tracking results are shared in media, reports, or journal articles, and the data commonly archived in online repositories (Roche et al. 2015, Soranno et al. 2015, Renaut et al. 2018) in compliance with commitments by many governments and research funding agencies to the FAIR (for findable, accessible, interoperable, reusable; Wilkinson et al. 2016) principles for scientific data management and stewardship. Data sharing and data reuse accelerate the pace of scientific discovery. Review of existing protocols and infrastructure to limit security risks Whereas researchers are directly responsible for stewardship of their tracking data, the growth of major networks and telemetry databases are beginning to tackle issues of data curation and to provide data owners with preferred protocols for archiving potentially sensitive data. Cyberinfrastructure is available for archiving and sharing large data sets from animal tracking studies, including institutional or third party repositories such as Dryad (http://datadryad.org), Zenodo (https://zenodo.org), and Movebank (www.movebank.org) and research networks that have data portals for archiving and sharing detection data (table 3). We reviewed data policies from major platforms providing data archiving and sharing services where animal movement data was a focus. Although we concentrate on movement data, we include databases that provide purely location data (e.g., Global Biodiversity Information Facility [GBIF], eBird, International Union for the Conservation of Nature; table 3). For example, location-based services often provide options to generalize species’ locations by decreasing resolution on the basis of the threats posed to the species (Chapman and Grafton 2008). Table 3. A summary of biodiversity databases that contain animal tracking information and their policies regarding sensitive data. Data sharing service . Description . Policy for sensitive data . How decision is made . Relevant links . OTN An international network for archiving detection data from animals tracked in aquatic environments Optional per-animal embargo based on a 2-year period following the end of electronic tag life. Embargoes may be waived at any time by the original data collectors. Rights to data citation and collaboration are retained by researchers producing and inputting data. Extensions and exceptions to existing embargoes are reviewed and approved by a scientific advisory committee composed of subject matter experts and data managers. https://members.oceantrack.org/data/policies/otn-data-policy-2018.pdf IMOS An Australian national ocean observing system that includes physical and biological observations. Includes two animal telemetry streams, satellite tagging and acoustic tracking. The latter is a network that archives detection data from animals tracked in aquatic environments around Australia By default all IMOS are openly available under a Creative Commons license and for satellite tagging they are released in real time. Acoustic data released on entry of receiver download metadata into the national database. Researchers may request animal-specific embargoes for sensitive acoustic data or full project-wide protection in extraordinary circumstances. Embargoes are granted for 3 years, with possibility of extension on application. For the acoustic stream a data committee composed of subject matter experts and data managers reviews applications from researchers to either embargo or protect their detection data. Embargoes are primarily granted to students to allow sufficient time to publish their results before making data publicly available. Applications for protected status require formal justification (e.g., endangered species attracting controversial public interest), with protecting commercial interests or publishing priority considered insufficient rationales. http://imos.org.au/fileadmin/user_upload/shared/IMOS%20General/Framework_Policy/2016_May_update/4.2_IMOS_Data_Policy_May16_Final_14062016.pdf FACT A regional network for archiving animal detection data in the Gulf of Mexico, Florida, Georgia, the Carolinas, and The Bahamas Collaborators may request that data be restricted access from other users with embargos preferably expiring after 4 years. Data may ultimately be released in part or after modification rather than in their entirety at the discretion of the PI. Collaborators are entitled to request an embargo from the database. http://secoora.org/wp-content/uploads/2018/07/FACT_user_agreement_and_data_policy_2018.pdf GBIF An open database for researchers and citizen scientists to share information about animal sightings Information holders must determine the level of sensitivity of their study species and choose to restrict data or generalize the spatial accuracy of data uploaded to the database. Dates for reviewing the sensitivity of the data must be provided at the discretion of the uploader. The information holder makes the request. www.gbif.org/document/80512 IUCN An international institution focused on status evaluation and range mapping of species at risk Endangered or critically endangered species, those that are threatened by trade or have economic value, or whose locations are not well known can have data withheld, with no limitations. IUCN SSC Red List Authority must make the case for protecting sensitive location data Annex 7: www.iucnredlist.org/resources/rules-of-procedure MOTUS A network for sharing radio telemetry data, mostly collected from birds, within the research community. Data for species at risk shared as normal, with option for delayed sharing (embargo) in exceptional circumstances that will be considered case by case. PI must contact Bird Studies Canada prior to uploading data with rationale for restricting the data and proposed embargo period https://motus.org/wp-content/uploads/2016/01/MotusCollaborationPolicy.January2016.pdf Movebank An international network for archiving animal tracking data Data on Movebank cannot be restricted, but researchers can upload it without publishing it to make it available to collaborators. Data can easily be embargoed until publication but longer embargoes are considered case by case Embargoes are discussed directly with Movebank by contacting support www.movebank.org/node/2220no.embargoes Dryad An international online data repository for all scientific data 1-year embargoes can be requested in special circumstances and longer ones may be granted if the journal editor agrees. Data will still be uploaded and a data file will be visible but the details will not be available and the file cannot be downloaded until the embargo expires. Journal editors must grant permission to embargo data submitted to Dryad http://datadryad.org/pages/faq eBird An international online database for bird observations Data for sensitive species can be hidden from the public or appear at poor resolution (e.g., grid cell resolution within 400 km2) or regionally resolution. Sensitive species are recommended by partners or published sources and are generally also listed as species at risk by IUCN. https://help.ebird.org/customer/portal/articles/2885265 Data sharing service . Description . Policy for sensitive data . How decision is made . Relevant links . OTN An international network for archiving detection data from animals tracked in aquatic environments Optional per-animal embargo based on a 2-year period following the end of electronic tag life. Embargoes may be waived at any time by the original data collectors. Rights to data citation and collaboration are retained by researchers producing and inputting data. Extensions and exceptions to existing embargoes are reviewed and approved by a scientific advisory committee composed of subject matter experts and data managers. https://members.oceantrack.org/data/policies/otn-data-policy-2018.pdf IMOS An Australian national ocean observing system that includes physical and biological observations. Includes two animal telemetry streams, satellite tagging and acoustic tracking. The latter is a network that archives detection data from animals tracked in aquatic environments around Australia By default all IMOS are openly available under a Creative Commons license and for satellite tagging they are released in real time. Acoustic data released on entry of receiver download metadata into the national database. Researchers may request animal-specific embargoes for sensitive acoustic data or full project-wide protection in extraordinary circumstances. Embargoes are granted for 3 years, with possibility of extension on application. For the acoustic stream a data committee composed of subject matter experts and data managers reviews applications from researchers to either embargo or protect their detection data. Embargoes are primarily granted to students to allow sufficient time to publish their results before making data publicly available. Applications for protected status require formal justification (e.g., endangered species attracting controversial public interest), with protecting commercial interests or publishing priority considered insufficient rationales. http://imos.org.au/fileadmin/user_upload/shared/IMOS%20General/Framework_Policy/2016_May_update/4.2_IMOS_Data_Policy_May16_Final_14062016.pdf FACT A regional network for archiving animal detection data in the Gulf of Mexico, Florida, Georgia, the Carolinas, and The Bahamas Collaborators may request that data be restricted access from other users with embargos preferably expiring after 4 years. Data may ultimately be released in part or after modification rather than in their entirety at the discretion of the PI. Collaborators are entitled to request an embargo from the database. http://secoora.org/wp-content/uploads/2018/07/FACT_user_agreement_and_data_policy_2018.pdf GBIF An open database for researchers and citizen scientists to share information about animal sightings Information holders must determine the level of sensitivity of their study species and choose to restrict data or generalize the spatial accuracy of data uploaded to the database. Dates for reviewing the sensitivity of the data must be provided at the discretion of the uploader. The information holder makes the request. www.gbif.org/document/80512 IUCN An international institution focused on status evaluation and range mapping of species at risk Endangered or critically endangered species, those that are threatened by trade or have economic value, or whose locations are not well known can have data withheld, with no limitations. IUCN SSC Red List Authority must make the case for protecting sensitive location data Annex 7: www.iucnredlist.org/resources/rules-of-procedure MOTUS A network for sharing radio telemetry data, mostly collected from birds, within the research community. Data for species at risk shared as normal, with option for delayed sharing (embargo) in exceptional circumstances that will be considered case by case. PI must contact Bird Studies Canada prior to uploading data with rationale for restricting the data and proposed embargo period https://motus.org/wp-content/uploads/2016/01/MotusCollaborationPolicy.January2016.pdf Movebank An international network for archiving animal tracking data Data on Movebank cannot be restricted, but researchers can upload it without publishing it to make it available to collaborators. Data can easily be embargoed until publication but longer embargoes are considered case by case Embargoes are discussed directly with Movebank by contacting support www.movebank.org/node/2220no.embargoes Dryad An international online data repository for all scientific data 1-year embargoes can be requested in special circumstances and longer ones may be granted if the journal editor agrees. Data will still be uploaded and a data file will be visible but the details will not be available and the file cannot be downloaded until the embargo expires. Journal editors must grant permission to embargo data submitted to Dryad http://datadryad.org/pages/faq eBird An international online database for bird observations Data for sensitive species can be hidden from the public or appear at poor resolution (e.g., grid cell resolution within 400 km2) or regionally resolution. Sensitive species are recommended by partners or published sources and are generally also listed as species at risk by IUCN. https://help.ebird.org/customer/portal/articles/2885265 Note: We provide a description of the database and its services (i.e., scope), a summary of their stated policy to researchers with sensitive data, information about who decides whether to protect data, and links that can be followed for more information. Note that all links were current as of July 2019. Open in new tab Table 3. A summary of biodiversity databases that contain animal tracking information and their policies regarding sensitive data. Data sharing service . Description . Policy for sensitive data . How decision is made . Relevant links . OTN An international network for archiving detection data from animals tracked in aquatic environments Optional per-animal embargo based on a 2-year period following the end of electronic tag life. Embargoes may be waived at any time by the original data collectors. Rights to data citation and collaboration are retained by researchers producing and inputting data. Extensions and exceptions to existing embargoes are reviewed and approved by a scientific advisory committee composed of subject matter experts and data managers. https://members.oceantrack.org/data/policies/otn-data-policy-2018.pdf IMOS An Australian national ocean observing system that includes physical and biological observations. Includes two animal telemetry streams, satellite tagging and acoustic tracking. The latter is a network that archives detection data from animals tracked in aquatic environments around Australia By default all IMOS are openly available under a Creative Commons license and for satellite tagging they are released in real time. Acoustic data released on entry of receiver download metadata into the national database. Researchers may request animal-specific embargoes for sensitive acoustic data or full project-wide protection in extraordinary circumstances. Embargoes are granted for 3 years, with possibility of extension on application. For the acoustic stream a data committee composed of subject matter experts and data managers reviews applications from researchers to either embargo or protect their detection data. Embargoes are primarily granted to students to allow sufficient time to publish their results before making data publicly available. Applications for protected status require formal justification (e.g., endangered species attracting controversial public interest), with protecting commercial interests or publishing priority considered insufficient rationales. http://imos.org.au/fileadmin/user_upload/shared/IMOS%20General/Framework_Policy/2016_May_update/4.2_IMOS_Data_Policy_May16_Final_14062016.pdf FACT A regional network for archiving animal detection data in the Gulf of Mexico, Florida, Georgia, the Carolinas, and The Bahamas Collaborators may request that data be restricted access from other users with embargos preferably expiring after 4 years. Data may ultimately be released in part or after modification rather than in their entirety at the discretion of the PI. Collaborators are entitled to request an embargo from the database. http://secoora.org/wp-content/uploads/2018/07/FACT_user_agreement_and_data_policy_2018.pdf GBIF An open database for researchers and citizen scientists to share information about animal sightings Information holders must determine the level of sensitivity of their study species and choose to restrict data or generalize the spatial accuracy of data uploaded to the database. Dates for reviewing the sensitivity of the data must be provided at the discretion of the uploader. The information holder makes the request. www.gbif.org/document/80512 IUCN An international institution focused on status evaluation and range mapping of species at risk Endangered or critically endangered species, those that are threatened by trade or have economic value, or whose locations are not well known can have data withheld, with no limitations. IUCN SSC Red List Authority must make the case for protecting sensitive location data Annex 7: www.iucnredlist.org/resources/rules-of-procedure MOTUS A network for sharing radio telemetry data, mostly collected from birds, within the research community. Data for species at risk shared as normal, with option for delayed sharing (embargo) in exceptional circumstances that will be considered case by case. PI must contact Bird Studies Canada prior to uploading data with rationale for restricting the data and proposed embargo period https://motus.org/wp-content/uploads/2016/01/MotusCollaborationPolicy.January2016.pdf Movebank An international network for archiving animal tracking data Data on Movebank cannot be restricted, but researchers can upload it without publishing it to make it available to collaborators. Data can easily be embargoed until publication but longer embargoes are considered case by case Embargoes are discussed directly with Movebank by contacting support www.movebank.org/node/2220no.embargoes Dryad An international online data repository for all scientific data 1-year embargoes can be requested in special circumstances and longer ones may be granted if the journal editor agrees. Data will still be uploaded and a data file will be visible but the details will not be available and the file cannot be downloaded until the embargo expires. Journal editors must grant permission to embargo data submitted to Dryad http://datadryad.org/pages/faq eBird An international online database for bird observations Data for sensitive species can be hidden from the public or appear at poor resolution (e.g., grid cell resolution within 400 km2) or regionally resolution. Sensitive species are recommended by partners or published sources and are generally also listed as species at risk by IUCN. https://help.ebird.org/customer/portal/articles/2885265 Data sharing service . Description . Policy for sensitive data . How decision is made . Relevant links . OTN An international network for archiving detection data from animals tracked in aquatic environments Optional per-animal embargo based on a 2-year period following the end of electronic tag life. Embargoes may be waived at any time by the original data collectors. Rights to data citation and collaboration are retained by researchers producing and inputting data. Extensions and exceptions to existing embargoes are reviewed and approved by a scientific advisory committee composed of subject matter experts and data managers. https://members.oceantrack.org/data/policies/otn-data-policy-2018.pdf IMOS An Australian national ocean observing system that includes physical and biological observations. Includes two animal telemetry streams, satellite tagging and acoustic tracking. The latter is a network that archives detection data from animals tracked in aquatic environments around Australia By default all IMOS are openly available under a Creative Commons license and for satellite tagging they are released in real time. Acoustic data released on entry of receiver download metadata into the national database. Researchers may request animal-specific embargoes for sensitive acoustic data or full project-wide protection in extraordinary circumstances. Embargoes are granted for 3 years, with possibility of extension on application. For the acoustic stream a data committee composed of subject matter experts and data managers reviews applications from researchers to either embargo or protect their detection data. Embargoes are primarily granted to students to allow sufficient time to publish their results before making data publicly available. Applications for protected status require formal justification (e.g., endangered species attracting controversial public interest), with protecting commercial interests or publishing priority considered insufficient rationales. http://imos.org.au/fileadmin/user_upload/shared/IMOS%20General/Framework_Policy/2016_May_update/4.2_IMOS_Data_Policy_May16_Final_14062016.pdf FACT A regional network for archiving animal detection data in the Gulf of Mexico, Florida, Georgia, the Carolinas, and The Bahamas Collaborators may request that data be restricted access from other users with embargos preferably expiring after 4 years. Data may ultimately be released in part or after modification rather than in their entirety at the discretion of the PI. Collaborators are entitled to request an embargo from the database. http://secoora.org/wp-content/uploads/2018/07/FACT_user_agreement_and_data_policy_2018.pdf GBIF An open database for researchers and citizen scientists to share information about animal sightings Information holders must determine the level of sensitivity of their study species and choose to restrict data or generalize the spatial accuracy of data uploaded to the database. Dates for reviewing the sensitivity of the data must be provided at the discretion of the uploader. The information holder makes the request. www.gbif.org/document/80512 IUCN An international institution focused on status evaluation and range mapping of species at risk Endangered or critically endangered species, those that are threatened by trade or have economic value, or whose locations are not well known can have data withheld, with no limitations. IUCN SSC Red List Authority must make the case for protecting sensitive location data Annex 7: www.iucnredlist.org/resources/rules-of-procedure MOTUS A network for sharing radio telemetry data, mostly collected from birds, within the research community. Data for species at risk shared as normal, with option for delayed sharing (embargo) in exceptional circumstances that will be considered case by case. PI must contact Bird Studies Canada prior to uploading data with rationale for restricting the data and proposed embargo period https://motus.org/wp-content/uploads/2016/01/MotusCollaborationPolicy.January2016.pdf Movebank An international network for archiving animal tracking data Data on Movebank cannot be restricted, but researchers can upload it without publishing it to make it available to collaborators. Data can easily be embargoed until publication but longer embargoes are considered case by case Embargoes are discussed directly with Movebank by contacting support www.movebank.org/node/2220no.embargoes Dryad An international online data repository for all scientific data 1-year embargoes can be requested in special circumstances and longer ones may be granted if the journal editor agrees. Data will still be uploaded and a data file will be visible but the details will not be available and the file cannot be downloaded until the embargo expires. Journal editors must grant permission to embargo data submitted to Dryad http://datadryad.org/pages/faq eBird An international online database for bird observations Data for sensitive species can be hidden from the public or appear at poor resolution (e.g., grid cell resolution within 400 km2) or regionally resolution. Sensitive species are recommended by partners or published sources and are generally also listed as species at risk by IUCN. https://help.ebird.org/customer/portal/articles/2885265 Note: We provide a description of the database and its services (i.e., scope), a summary of their stated policy to researchers with sensitive data, information about who decides whether to protect data, and links that can be followed for more information. Note that all links were current as of July 2019. Open in new tab To respect FAIR principles, data embargoes or generalization must have an expiry date for all but the most critically sensitive species (table 3). Campbell and colleagues (2015) suggested a 3-year embargo on wildlife telemetry data amounting to the average lifespan of telemetry projects. Roche and colleagues (2015) discussed embargoes related to data archiving in the Dryad database and suggested that a 5-year data embargo would be sufficient to assuage concerns of premature access by other researchers for ecology and evolution data. A review of the outcomes was recommended after 5 years, to determine whether the protections from the embargo were sufficient or whether an additional 5-year embargo should be initiated. The Ocean Tracking Network data embargoes can be extended by the data creators, but by default are set to expire 2 years after the end of a tag's expected life. Key to FAIR and effective protection of sensitive animal movement data is a transparent decision making process. Networks may have policies for embargoes and it is the purview of the researcher to request an embargo where perceived necessary. It is unclear how frequently such individual requests are denied, although the IMOS policy explicitly states that publication priority or commercial interests are insufficient grounds to grant an embargo (table 3). Best practices advised by the GBIF are to determine whether the species is exposed to anthropogenic stressors, whether it is sensitive to those stressors, and whether those stressors would be exacerbated by the release of location data. Implementing data protections for responsible telemetry Given situations where risks to animals are possible, data transmitted or logged by electronic tags should be protected so their data cannot be immediately decoded and identify an animal's position. Manufacturers of transmitters must have secure software options available to provide protection from attempts to intercept data by third parties. For sensitive studies, metadata should be restricted so even if a transmitter signal is intercepted it does not provide the identity of the animal (i.e., the species). This could be further accomplished by encrypting signals before the receiver decodes them, which would be more efficient than attempting to limit access to equipment, because the latter may not be feasible. In many extant systems, a connection between a computer and a receiver or logger is sufficient to successfully offload data with no security protocols limiting who may access the data. When the risk of physically breaching receivers, loggers, or repositories that contain sensitive animal position data is perceived, the data may be strongly encrypted to ensure they are uninterpretable without a compatible key. Raw data could be encrypted whether stored on receivers or uplinked from satellites to online accounts as an additional layer of security. Live data streaming services (e.g., Keating et al. 1991) only release transmission data from compatible UHF tags to account holders; however, goninometers can make it possible for third parties to locate satellite tagged individuals (e.g., equipped with SPOTs) or recover satellite tags in the ocean (PSATs) and then directly offload the data without data security protocols. We emphasize that, as a rule, researchers should strive to make their tracking data open and available where possible. The information often has immense value to multiple parties including, for example, informing the general public as well as serving the needs of the scientists and managers who directly undertake the research. Stakeholder identification and consultation are therefore essential in developing animal tracking studies to ensure the socioeconomic context of the animal tracking is well understood. Stakeholder consultation also allows the researchers to ascertain the level of risk prior to implementing a study, because researchers may be naive to other group perspectives in a study system. By default, researchers should be expected to upload tracking data without restrictions or generalization in the context of it being shared openly and freely. We suggest that the use or request of embargos should include a risk assessment (box 2), and we present a template in box 2 and figure 1. Embargos should have the option for renewal depending on the sensitivity of the study, and we provide an avenue by which to consider this (figure 1). Box 2. Questions proposed for assessing study design and data management by researchers undertaking a study on animals with electronic tags. This information is presented as a flow chart in figure 1. Is my focal species listed as threatened or special concern by local or global agencies? Note a single species can be threatened at one locale but abundant at another Is my species of high monetary value? Specify whether commercial or through illegal sale. Is my study site easily accessible—that is, vulnerable to interception of real-time tracking data by third parties? Is my study site a high-risk site for animal disturbance because of poaching or ecotourism activity? Is the technology widely used and therefore access to receivers to detect tags is easy? Have all relevant stakeholders with vested interests in the study species been identified? What is the role of stakeholders with regard to the tagged species; can these be evaluated during and after implementation? Which stakeholders should be contacted regarding the local cultural and economic importance of the animals What details will be provided to selected stakeholders (e.g., metadata, tag ID, radio tag frequencies)? How will access to the tracking data affect the vulnerability of tagged or untagged individuals to anthropogenic disturbance? Assess the risk dependent on species, location, type of technology, questions addressed in the study (i.e., identifying aggregation sites: Are individuals gregarious or solitary either seasonally or year long? What are the consequences of poaching are lower if species is solitary rather than gregarious?) Will sharing the data increase the vulnerability of the study species to disturbance? Would a temporary embargo or spatial jittering of the movement patterns solve potential issues with data sharing? Is it justifiable that data should never be released publicly, including through social media, in maps printed in journal articles, or in publicly accessible databases? Figure 1. Open in new tabDownload slide Recognizing and mitigating potential data security challenges is difficult; we present this flow chart based on questions in box 2 to identify key questions researchers pose before implementing a tracking project. For data that might be vulnerable to direct interception by poachers using tracking technology, metadata should be protected and signal transmissions encrypted to limit the ability for poachers to identify individuals. For species vulnerable to poaching by indirect interception of data in publications, databases, or maps, data can be embargoed with an option to renew the embargo. However, we believe there are great benefits to sharing data and that whenever possible data should be shared and communicated to stakeholders through establishing clear data agreements. Researchers with effective data management plans and journals or databases with clear rules for data embargos will facilitate effective data sharing and scientific communication. Figure 1. Open in new tabDownload slide Recognizing and mitigating potential data security challenges is difficult; we present this flow chart based on questions in box 2 to identify key questions researchers pose before implementing a tracking project. For data that might be vulnerable to direct interception by poachers using tracking technology, metadata should be protected and signal transmissions encrypted to limit the ability for poachers to identify individuals. For species vulnerable to poaching by indirect interception of data in publications, databases, or maps, data can be embargoed with an option to renew the embargo. However, we believe there are great benefits to sharing data and that whenever possible data should be shared and communicated to stakeholders through establishing clear data agreements. Researchers with effective data management plans and journals or databases with clear rules for data embargos will facilitate effective data sharing and scientific communication. Solutions for a changing data landscape Data management plans provide an effective tool for scientists using telemetry to proactively address concerns about data misuse and provide transparency about embargoes, if necessary (Michener 2015). Funding agencies such as the Australian Research Council, UK Research Councils, the National Science Foundation, NASA, and others require data management plans from scientists so that expectations are clear to all parties about the ultimate fate of the data. Although they may need to be flexible as conditions change over the course of a multiyear study, data management plans assist in managing expectations of funding agencies and often satisfy publishing outlets that require data to be made open access. The long-term fate of data requires a broader discussion about the ownership and power of attorney over data to ensure that researchers are not solely responsible for making decisions about its fate. In the future, it may be useful to establish treaties or other international agreements when tracking sensitive species and when one might anticipate conflict. We are unaware of any such agreements at present. We expect that in the near future real-time animal tracking data will be of even greater value in ways previously unforeseen (box 1). Initiatives pursuing the vision of bringing real-time animal data to the public and beyond the traditional research sphere include the sensor network in a wetland area (Li et al. 2015), augmented reality in daily life (www.internetofelephants.com), and efforts to merge human data with animal data (Frey et al. 2017b). These varied initiatives using animal movement data collected with telemetry require consideration of how best to protect the data from misuse when they become widely available rapidly and automatically. To protect sensitive data from fraud and misuse, stronger organizational or technical measures must be taken than those currently used with near real-time or archived data. In principle, the same protective measures can be applied as are used for other types of sensitive data, such as financial or personal data. Drawing on the experiences of others working in data management and data mining with sensitive personal data, we provide some technical approaches that could be used to protect real-time animal data from misuse. Possible approaches include data blurring (reduce location accuracy), noise addition (add location errors), differential privacy (add randomness), data aggregation (share habitat instead of location), data hiding (share altitude but hide latitude or longitude), homomorphic encryption (analyze encrypted data), and multiparty computation (jointly analyze while keeping data private). However, all the popular anonymization and pseudonymization approaches used with human data are less useful in this context because the identity of an animal is rarely important; that is, with rare exceptions, its identity does not need to be protected. As the number of instruments used to track animals increase and become progressively more complex, central monitoring of the devices will be necessary. Oceanographic buoys are presently monitored by a central registry JCOMMOPS (www.jcommops.org/board) and can alert research and government bodies when instruments cross boundaries. Animals making similar movements and, in certain instances, collecting similar oceanographic data may soon require this type of international organizational framework to avoid having instrumented animals mistaken for spies that are carrying out illicit surveillance (www.imr.no/en/hi/news/2019/may/beluga-whale-with-harness). International cooperation bringing tracking communities together will empower researchers with standards and expectations of data management, sharing, protection. Conclusions Maps and visualizations of animal movement are probably the most compelling deliverables from scientific research on animal movement (Demšar et al. 2015) and sharing fascinating animal movement information should be encouraged to facilitate understanding and engagement with research. We strongly support safe promulgation of animal telemetry data but with consideration and recognition of potentials risk to the studied species and the environment they inhabit. The presented framework will encourage researchers to share their research while protecting their study systems (Bickford et al. 2012, Cooke et al. 2017a). Specifically, data-protection principles can be applied regardless of the technology used and the animal observed. These principles are presented because we suggest that the larger scope of the problem is still emerging and not completely understood. At the time of writing, relatively few animal tracking projects are predicted to be deemed high risk and require data security. Even for rare species, or those at high risk, the animals may be inaccessible to potential poachers or the species may be highly mobile and therefore the data does not provide relevant information with which to find them. However, the risk of animal tracking data getting into the wrong hands remains highest in situ. Direct interception of tracking signals is the point at which animals are most likely to be harassed or harvested. Risk assessment prior to implementing a study can help reduce or eliminate this risk and provide avenues for data to be shared in a safe and timely fashion. Acknowledgments Lennox was supported by the Natural Sciences and Engineering Research Council of Canada (NSERC) and was a member of Ocean Tracking Network (OTN) Canada. Muelbert was supported by a CAPES Fellowship. Cooke was supported by NSERC, the Canada Research Chairs Program and OTN Canada. Roche was supported by the European Union's Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement no. 838237-OPTIMISE. Author Biographical Robert J. Lennox (robertlennox9@gmail.com), Dominique G. Roche, and Steven J. Cooke are affiliated with the Fish Ecology and Conservation Physiology Laboratory, in the Department of Biology at Carleton University, in Ottawa, Ontario, Canada, and RJL is also affiliated with the Laboratory for Freshwater Ecology and Inland Fisheries, part of the Norwegian Research Centre (NORCE), in Bergen, Norway. Robert Harcourt and Clive McMahon are affiliated with the Department of Biological Sciences at Macquarie University, in North Ryde, New South Wales, Australia. Joseph R. Bennett, Vivian M. Nguyen, and SJC are affiliated with the Institute of Environmental and Interdisciplinary Science and the Department of Biology at Carleton University, in Ottawa, Ontario, Canada. Alasdair Davies is affiliated with the Conservation Technology Unit of the Zoological Society of London, in London, England. Adam T. Ford is affiliated with the Department of Biology at the University of British Columbia, in Kelowna, British Columbia, Canada. Remo M. Frey is affiliated with the Department of Management, Technology, and Economics at ETH Zurich, in Zurich, Switzerland. Matt. W Hayward is affiliated with the Centre for Conservation Ecology at Nelson Mandela University, in Port Elizabeth, South Africa, with the College of Natural Sciences at Bangor University, in Bangor, United Kingdom, and with the School of Environmental and Life Sciences at the University of Newcastle, in Callaghan, New South Wales, Australia. Nigel E. Hussey is affiliated with the Department of Biological Sciences at the University of Windsor, in Windsor, Ontario, Canada. Sara J. Iverson, Jonathan D. Pye, and Frederick G. Whoriskey are affiliated with the Ocean Tracking Network, at Dalhousie University, in Halifax, Nova Scotia, Canada. SJI and FGW are additionally affiliated with the Department of Biology at Dalhousie University, in Halifax, Nova Scotia, Canada. Roland Kays is affiliated with the Department of Forestry and Environmental Resources at North Carolina State University, and with the North Carolina Museum of Natural Sciences, both in Raleigh, North Carolina. Steven T. Kessel is affiliated with the Daniel P. Haerther Center for Conservation and Research, at the John G. Shedd Aquarium, in Chicago, Illinois. Monica Muelbert is affiliated with the Instituto de Oceanografia, in Rio Grande, Rio Grande de Sul, Brazil. Taryn S. Murray is affiliated with the South African Institute for Aquatic Biodiversity, in Grahamstown, South Africa. DGR is also affiliated with the Institute of Biology at the University of Neuchâtel, in Neuchâtel, Switzerland. Nathan Young is affiliated with the Department of Sociology and Anthropology at the University of Ottawa, in Ottawa, Ontario, Canada. References cited Allen AM , Singh NJ. 2016 . Linking movement ecology with wildlife management and conservation . Frontiers in Ecology and Evolution 3 : 155 . Google Scholar Crossref Search ADS WorldCat Bickford D , Posa MRC, Qie L, Cmpos-Arceiz A, Kudavidange EP. 2012 . Science communication for biodiversity conservation . Biological Conservation 151 : 74 – 76 . Google Scholar Crossref Search ADS WorldCat Brodie S , Lédée EJ, Heupel MR, Babcock RC, Campbell HA, Gledhill DC, Hoenner X, Huveneers C, Jaine FR, Simpfendorfer CA, Taylor MD, Udyawer V, Harcourt RG. 2018 . Continental-scale animal tracking reveals functional movement classes across marine taxa . Scientific Reports 8 : 3717 . Google Scholar Crossref Search ADS PubMed WorldCat Brooks JL , Chapman JM, Barkley AN, Kessel ST, Hussey NE, Hinch SG, Patterson DA, Hedges KJ, Cooke SJ, Fisk AT, Gruber SH, Nguyen VM. 2018 . Biotelemetry informing management: Case studies exploring successful integration of biotelemetry data into fisheries and habitat management . Canadian Journal of Fisheries and Aquatic Sciences : 1 – 15 . OpenURL Placeholder Text WorldCat Campbell HA et al. 2015 . Finding our way: On the sharing and reuse of animal telemetry data in Australasia . Science of the Total Environment 534 : 79 – 84 . Google Scholar Crossref Search ADS PubMed WorldCat Chapman AD , Grafton O. 2008 . Guide to Best Practices for Generalising Sensitive Psecies-Occurrence Data, version 1.0 . Global Biodiversity Information Facility . www.gbif.org/document/80512 . OpenURL Placeholder Text WorldCat Cooke SJ . 2008 . Biotelemetry and biologging in endangered species research and animal conservation: Relevance to regional, national, and IUCN Red List threat assessments . Endangered Species Research 4 : 165 – 185 . Google Scholar Crossref Search ADS WorldCat Cooke SJ , Gallagher AJ, Sopinka NM, Nguyen VM, Skubel RA, Hammerschlag N, Danylchuk AJ. 2017a . Considerations for effective science communication . FACETS 2 : 233 – 248 . Google Scholar Crossref Search ADS WorldCat Cooke SJ , Nguyen VM, Kessel ST, Hussey NE, Young N, Ford AT. 2017b . Troubling issues at the frontier of animal tracking for conservation and management . Conservation Biology 31 : 1205 – 1207 . Google Scholar Crossref Search ADS WorldCat Crossin GT , Heupel MR, Holbrook CM, Hussey NE, Lowerre-Barbieri SK, Nguyen VM, Raby GD, Cooke SJ. 2017 . Acoustic telemetry and fisheries management . Ecological Applications 27 : 1031 – 1049 . Google Scholar Crossref Search ADS PubMed WorldCat Demšar U , Buchin K, Cagnacci F, Safi K, Speckmann B, Van de Weghe N, Weiskopf D, Weibel R. 2015 . Analysis and visualisation of movement: An interdisciplinary review . Movement Ecology 3 : 5 . Google Scholar Crossref Search ADS PubMed WorldCat Fraser EJ , Macdonald DW, Bryce R, Lambin X. 2014 . Controlling invasive species by empowering environmental stakeholders: Ecotourism boat operators as potential guardians of wildlife against the invasive American mink . Oryx 48 : 605 – 612 . Google Scholar Crossref Search ADS WorldCat Frey RM , Hardjono T, Smith C, Erhardt K, Pentland AS. 2017a . Secure sharing of geospatial wildlife data. Article 5 in Bouros P., Sarwat M., eds. GeoRich ‘17: Proceedings of the Fourth International ACM Workshop on Managing and Mining Enriched Geo-Spatial Data . Association for Computing Machinery . Google Scholar Google Preview OpenURL Placeholder Text WorldCat COPAC Frey RM , Miller GA, Ilic A, Fleisch E, Pentland A. 2017b . Wild animals in daily life . Pages 1 – 12 . ICIS Proceedings 2017 . Association for Information Systems . Goulet P , Guinet C, Swift R, Madsen PT, Johnson M. 2019 . A miniature biomimetic sonar and movement tag to study the biotic environment and predator–prey interactions in aquatic animals . Deep Sea Research, part I: Oceanographic Research Papers 148 : 1 – 11 . Hartter J , Ryan Sj, MacKenzie CA, Parker JN, Strasser CA. 2013 . Spatially explicit data: Stewardship and ethical challenges in science . PLOS Biology 11 ( art. e1001634 ). OpenURL Placeholder Text WorldCat Harcourt R et al. 2019 . Animal-borne telemetry: An integral component of the ocean observing toolkit . Frontiers in Marine Science. 6 : 326 . Google Scholar Crossref Search ADS WorldCat Hays GC et al. 2019 . Translating marine animal tracking data into conservation policy and management . Trends in Ecology and Evolution 34 : 459 – 473 . Google Scholar Crossref Search ADS PubMed WorldCat Hayward MW , Somers MJ, Kerley GIH, Perrin MR, Bester MN, Dalerum F, Do Linh San E, Hoffman LC, Marhsal JP, Mills MGL, Nel JAJ, Owen-Smith N. 2012 . Animal ethics and ecotourism . South African Journal of Wildlife Research 42 : 3 – 5 . OpenURL Placeholder Text WorldCat Hussey N et al. 2015 . Aquatic animal telemetry: A panoramic window into the underwater world . Science 348 : 1255642 . Google Scholar Crossref Search ADS PubMed WorldCat Kays R , Crofoot MC, Jetz W, Wikelski M. 2015 . Terrestrial animal tracking as an eye on life and planet . Science 348 : aaa2478 . Google Scholar Crossref Search ADS PubMed WorldCat Keating KA , Brewster WG, Key CH. 1991 . Satellite telemetry: Performance of animal-tracking systems . The Journal of Wildlife Management 55 : 160 – 171 . Google Scholar Crossref Search ADS WorldCat Kempner J , Merz JF, Bosk CL. 2011 . Forbidden knowledge: Public controversy and the production of nonknowledge . Sociological Forum 26 : 475 – 500 . Google Scholar Crossref Search ADS WorldCat Kessel ST , Hussey NE, Crawford RE, Yurkowski DJ, Webber DM, Dick TA, Fisk AT. 2017 . First documented large-scale horizontal movements of individual Arctic cod (Boreogadus saida) . Canadian Journal of Fisheries and Aquatic Sciences 74 : 292 – 296 . Google Scholar Crossref Search ADS WorldCat Lennox RJ , Engler-Palma C, Kowarski K, Filous A, Whitlock R, Cooke SJ, Auger-Méthé M. 2019 . Optimizing marine spatial plans with animal tracking data . Canadian Journal of Fisheries and Aquatic Sciences 76 : 497 – 509 . Google Scholar Crossref Search ADS WorldCat Li Q , Dublon G, Mayton B, Paradiso JA. 2015 . MarshVis: Visualizing real-time and historical ecological data from a wireless sensor network . MIT Media Lab . https://resenv.media.mit.edu/pubs/papers/MarshVis_TechReport2015.pdf . OpenURL Placeholder Text WorldCat Lindenmayer D , Scheele B. 2017 . Do not publish . Science 356 : 800 – 801 . Google Scholar Crossref Search ADS PubMed WorldCat McGowan J et al. 2017 . Integrating research using animal‐borne telemetry with the needs of conservation management . Journal of Applied Ecology 54 : 423 – 429 . Google Scholar Crossref Search ADS WorldCat Meeuwig J , Harcourt R, Whoriskey F. 2015 . When science places threatened species at risk . Conservation Letters 8 : 151 – 152 . Google Scholar Crossref Search ADS WorldCat Merton RK . 1973 . The Normative Structure of Science . Pages 267 – 278 in Merton RK, ed. The Sociology of Science . University of Chicago Press . Google Scholar Google Preview OpenURL Placeholder Text WorldCat COPAC Michener WK. 2015 . Ecological data sharing . Ecological Informatics 29 : 33 – 44 . Google Scholar Crossref Search ADS WorldCat Nguyen VM , Brooks J, Young N, Lennox RJ, Haddaway N, Whoriskey FG, Harcourt R, Cooke SJ. 2017 . To share or not to share in the emerging era of big data: Perspectives from fish telemetry researchers on data sharing . Canadian Journal of Fisheries and Aquatic Sciences 74 : 1260 – 1274 . Google Scholar Crossref Search ADS WorldCat Raymond B et al. 2015 . Important marine habitat off East Antarctica revealed by two decades of multi-species predator tracking . Ecography 38 : 121 – 129 . Google Scholar Crossref Search ADS WorldCat Renaut S , Budden AE, Gravel D, Poisot T, Peres-Neto P. 2018 . Management, archiving, and sharing for biologists and the role of research institutions in the technology-oriented age . BioScience 68 : 400 – 411 . Google Scholar Crossref Search ADS WorldCat Roche DG , Kruuk LE, Lanfear R, Binning SA. 2015 . Public data archiving in ecology and evolution: How well are we doing? PLOS Biology 13 ( art. e1002295 ). OpenURL Placeholder Text WorldCat Soranno PA , Cheruvelil KS, Elliott KC, Montgomery GM. 2015 . It's good to share: Why environmental scientists’ ethics are out of date . BioScience 65 : 69 – 73 . Google Scholar Crossref Search ADS PubMed WorldCat Stuart BL , Rhodin AG, Grismer LL, Hansel T. 2006 . Scientific description can imperil species . Science 312 : 1137 . Google Scholar Crossref Search ADS PubMed WorldCat Treasure AM et al. 2017 . Marine mammals exploring the oceans pole to pole: A review of the MEOP consortium . Oceanography 302 : 132 – 138 . Google Scholar Crossref Search ADS WorldCat Tulloch AI et al. 2018 . A decision tree for assessing the risks and benefits of publishing biodiversity data . Nature Ecology and Evolution 2 : 1209 – 1217 . Google Scholar Crossref Search ADS PubMed WorldCat Wilmers CC , Nickel B, Bryce CM, Smith JA, Wheat RE, Yovovich V. 2015 . The golden age of bio‐logging: How animal‐borne sensors are advancing the frontiers of ecology . Ecology 96 : 1741 – 1753 . Google Scholar Crossref Search ADS PubMed WorldCat Wilkinson MD et al. 2016 . The FAIR Guiding Principles for scientific data management and stewardship . Scientific Data 3 : e160018 . Google Scholar Crossref Search ADS WorldCat Young N , Corriveau M, Nguyen VM, Cooke SJ, Hinch SG. 2018 . Embracing disruptive new science? Biotelemetry meets co-management in Canada's Fraser River . Fisheries 43 : 51 – 60 . Google Scholar Crossref Search ADS WorldCat © The Author(s) 2020. Published by Oxford University Press on behalf of the American Institute of Biological Sciences. This article is published and distributed under the terms of the Oxford University Press, Standard Journals Publication Model (https://academic.oup.com/journals/pages/open_access/funder_policies/chorus/standard_publication_model) TI - A Novel Framework to Protect Animal Data in a World of Ecosurveillance JF - BioScience DO - 10.1093/biosci/biaa035 DA - 2020-06-01 UR - https://www.deepdyve.com/lp/oxford-university-press/a-novel-framework-to-protect-animal-data-in-a-world-of-ecosurveillance-bojuUdRKLR SP - 468 VL - 70 IS - 6 DP - DeepDyve ER -