Requesting files into the TRE

Introduction

HIC can be considered as data curators, and securely manage access to data. Similarly to requesting files out of the TRE, we also review files requested into the TRE. This article describes the steps on how-to safely request files (e.g., software, trained models) into your TRE workspace. It provides guidance on what is required from you, as a 'Safe Person' or approved TRE user, to ensure secure file transfers into your project.

 


 Instructions

Step 1 - Create a Request by e-mailing us

  • Email HICSupport@dundee.ac.uk from your authorised TRE User account (not your gmail/yahoo/ personal account)

  • Subject title “Data input request for [Insert project name/number]”

  • Please Cc in the project Principal Investigator for their approval

Step 2 - Provide Information

Do not send data directly to us, speak to us to identify the appropriate data transfer process which will be project-dependent, similar to information governance.

  • Identify the file contents - Trained model, Python/ R/ Matlab etc. scripts or code files, Open source/ publicly available dataset, packaged software

  • Confirm if it contains any identifiable information or individual-level information.

  • Confirm if you are authorised to request the input of this file and/or if you have completed a Data Sharing Agreement.

The contents of the data must be readable. Content cannot contain any individual level data e.g. PROCHI. If there is any doubt around the file’s contents, then these requests will be referred to HIC Data Team for their verification and approval.

Step 3 - Click send

  • When we receive this email, our project management system will automatically create a ticket for your request.

  • Requests must be sent from your work account only (your work account that we consider the ‘TRE User Organisation’ according to our TRE User Agreement), and not Gmail, nor other personal email, etc.

  • Tickets are reviewed on week days and may take 1-3 days to be approved for simple file requests (e.g. summary reports, tables). More complex requests such as trained models or software, may take significantly longer.


For queries or comments regarding HIC How To Articles contact, HICSupport@dundee.ac.uk

 

Please familiarise yourself with the related articles below for additional information on our processes in our Standard Operating Procedure (SOP) on Data Security, and our other HIC Knowledge Base articles.

 Related articles

Disclosure control of Artificial Intelligence and Machine Learning models

https://hicservices.atlassian.net/wiki/x/ugIEBg

https://hicservices.atlassian.net/wiki/x/AQA0BQ

 

Related pages