Forty years later, network technologies allow for superior security combined with greater ease of access. In the 1980s, it was common and considered secure enough to send around floppy disks, which researchers then inserted into stand-alone desktop computers in a locked room. However, it is also the setting that is most dependent on rapidly evolving technology. Within the Five Safes framework, safe settings rely heavily on the physical environments in which data are stored, processed, transmitted, and accessed, and from which researchers can access computers that store and process the data.
12 The Stanford-SFUSD Partnership: Development of Data-Sharing Structures and Processes.11.7 Sustainability and Continued Success.11.5 Protection of Sensitive and Personal Data: The Five Safes Framework.11 Aurora Health Care: Using Electronic Medical Records for a Randomized Evaluation of Clinical Decision Support.10.7 Sustainability and Continued Success.10.5 Protection of Sensitive and Personal Data: The Five Safes Framework.10 The Private Capital Research Institute: Making Private Data Accessible in an Opaque Industry.9.8 Sustainability and Continued Success.9.6 Protection of Sensitive and Personal Data: The Five Safes Framework.9.5 Legal Framework for Granting Data Access.9 New Brunswick Institute for Research, Data and Training, University of New Brunswick: A Ten-Year Partnership Between Government and Academia - the Establishment of NB-IRDT.8.7 Sustainability and Continued Success.8.6 Data Life Cycle and Reproducibility.8.5 Protection of Sensitive and Personal Data: The Five Safes Framework.8 Ohio and the Longitudinal Data Archive: Mutually Beneficial Partnerships Between State Government and Researchers.7.7 Sustainability and Continued Success.7.5 Protection of Sensitive and Personal Data: The Five Safes Framework.7 Institute for Employment Research, Germany: International Access to Labor Market Data.6.3 Aligning Risks, Controls, and Uses: Where Is the Use of Differential Privacy Appropriate?.6.2 How Differential Privacy Protects Privacy.6 Designing Access with Differential Privacy.5.1 Purpose of Statistical Disclosure Limitation Methods: Definitions and Context.5 Balancing Privacy and Data Usability: An Overview of Disclosure Avoidance Methods.4.7 Strategies for Communicating With the IRB.4.5 What the IRB Will Do to Ensure the Protection of Participants.4 Collaborating with the Institutional Review Board (IRB).3 Model Data Use Agreements: A Practical Guide.2.7 Guidance for Data Providers and Researchers.2.6 Specific Data Access Mechanisms Along the Five Aspects.2.5 Five Aspects of Data Access Mechanisms.2.3 Technical Features of Data Access Mechanisms.1.2 Why is the Analysis of Administrative Data Still Relatively Rare?.1.1 The Potential of Administrative Data for Research and Policymaking.1 Using Administrative Data for Research and Evidence-Based Policy: An Introduction.