(blue star) Introduction

This instruction describes the steps on how-to safely request files into your project (input) on our Trusted Research Environment (TRE). This instruction outlines the steps for safely requesting file uploads (e.g., software, trained models) into your Trusted Research Environment (TRE) workspace. It provides guidance on what is required from you, as a 'Safe Person' or approved TRE user, to ensure secure file transfers into your project.


(blue star) Instructions

Step 1 - Create a Request by e-mailing us

Step 2 - Provide Information

Do not send data directly to us, speak to us to identify the appropriate data transfer process which will be project-dependent, similar to information governance.

(blue star) The contents of the data must be readable. Content cannot contain any individual level data e.g. PROCHI. If there is any doubt around the file’s contents, then these requests will be referred to a Data Analyst for their verification and approval.

Step 3 - Send the email for submission


For queries or comments regarding HIC How To Articles contact, HICSupport@dundee.ac.uk

Please familiarise yourself with the related articles below for additional information on our processes in our Standard Operating Procedure (SOP) on Data Security, and our other HIC Knowledge Base articles.

(blue star) Related articles

https://hicservices.atlassian.net/wiki/x/AYDODg

https://hicservices.atlassian.net/wiki/x/ugIEBg

https://hicservices.atlassian.net/wiki/x/AQA0BQ