👋 Introduction
This instruction HIC can be considered as data curators, and securely manage access to data. Similarly to requesting files out of the TRE, we also review files requested into the TRE. This article describes the steps on how-to safely request files into your project (input) on our Trusted Research Environment (TRE). HIC operate within the Five Safes Framework and are flexible if you would like files ((e.g., software, trained models or otherwise) to be uploaded into your TRE workspace. This instruction details this process and what we need from you a ‘Safe It provides guidance on what is required from you, as a 'Safe Person' or approved TRE Useruser, to ensure secure file transfers into your project.
...
\uD83D\uDCD8 Instructions
...
📧 Step 1 - Create a Request by e-mailing us
Email HICSupport@dundee.ac.uk
...
from your authorised
...
TRE User account (not your
...
State the reason for the request
...
Provide the source of the data (providing relevant links)
...
gmail/yahoo/ personal account)
Subject title “Data input request for [Insert project name/number]”
Information about the requested input:
Please Cc in the project Principal Investigator for their approval
📚 Step 2 - Provide Information
Reason for the request (if this is a trained model request please refer to https://hicservices.atlassian.net/wiki/x/AYDODg )
Source of the data (providing relevant links). Is the file a public GitHub repository or website, a private/ temporary download link or attachment by email?
Do not send data directly to us, speak to us to identify the appropriate data transfer process which will be project-dependent, similar to informtion information governance.
...
Please Cc in the project Prinicpal Investigator for their approval
Please copy and paste the following template and mark an 'x' where applies:
Your file is:
...
Identify the file contents - Trained model, Python/ R/ Matlab etc. scripts or code files, Open source/ publicly available dataset
...
[ ] - A public Git repository or website not affiliated with me or the project
[ ] - A private/temporary download link or attachment by email
Does it contain...
...
, packaged software
Confirm if it contains any identifiable information or individual-level information.
...
Confirm if you are authorised to request the
...
input of this file and/or if you have completed a Data Sharing Agreement.
🔍 The contents of the data must be readable. Content cannot contain any individual level data e.g. PROCHI. If there is any doubt around the file’s contents, then these requests will be referred to a HIC Data Analyst Team for their verification and approval.
⌛ Expected time lines
...
📬 Step 3 - Click send
When we receive this email, our project management system will automatically create a ticket for your request.
Requests must be sent from your work account only (your work account that we consider the ‘TRE User Organisation’ according to our TRE User Agreement), and not Gmail, nor other personal email, etc.
Tickets are reviewed on week days and may take 1-3 days to be approved for simple file requests (
...
e.
...
g.
...
summary reports, tables
...
). More complex
...
requests such as
...
trained models or software, may take significantly longer.
...
For queries or comments regarding HIC How To Articles contact, HICSupport@dundee.ac.uk
Info |
---|
Please familiarise yourself with the related articles below for additional information on our processes in our Standard Operating Procedure (SOP) on Data Security, and our other HIC Knowledge Base articles. |
\uD83D\uDCCB Related articles
https://hicservices.atlassian.net/wiki/x/AYDODg
...