Operational considerations when giving external access to your data

There cannot be one access policy applicable to all projects because many factors differ between projects. Your sharing policies should be tailored to your project. Yet, only share data that answers the required pre-conditions.

Frequently Asked Questions

The captured data from one or more sources are made available in a research environment.

The research environment is well defined in terms of:

  • purpose;
  • consent;
  • ownership and governance;
  • infrastructure and architecture (e.g., a distributed virtual research environment).

and argued with respect to:

  • fit for purpose;
  • level of data sensitivity;
  • level of completeness;
  • level of security.

Level 5 - Extremely sensitive information about individually identifiable people

Level 4 - Very sensitive information about individually identifiable people

Level 3 - Sensitive information about individually identifiable people

Level 2 - Benign information about individually identifiable people

Level 1 - De-identified research information about people and other non-confidential research information