
Background A Trusted Research Environment (TRE; also known as a Safe Haven) is an environment supported by trained staff and agreed processes (principles and standards), providing access to data for research while protecting patient confidentiality. Accessing sensitive data without compromising the privacy and security of the data is a complex process. Objective This paper presents the security measures, administrative procedures, and technical approaches adopted by TREs. Methods We contacted 73 TRE operators, 22 (30%) of whom, in the United Kingdom and internationally, agreed to be interviewed remotely under a nondisclosure agreement and to complete a questionnaire about their TRE. Results We observed many similar processes and standards that TREs follow to adhere to the Seven Safes principles. The security processes and TRE capabilities for supporting observational studies using classical statistical methods were mature, and the requirements were well understood. However, we identified limitations in the security measures and capabilities of TREs to support “next-generation” requirements such as wide ranges of data types, ability to develop artificial intelligence algorithms and software within the environment, handling of big data, and timely import and export of data. Conclusions We found a lack of software or other automation tools to support the community and limited knowledge of how to meet the next-generation requirements from the research community. Disclosure control for exporting artificial intelligence algorithms and software was found to be particularly challenging, and there is a clear need for additional controls to support this capability within TREs.
Original Paper, Computer applications to medicine. Medical informatics, name=Health Informatics, R858-859.7, 610, /dk/atira/pure/subjectarea/asjc/2700/2718, trusted research environment, data safe haven, 004, Artificial Intelligence, Privacy, Humans, TRE, Public aspects of medicine, RA1-1270, health data analysis, Computer Security, Confidentiality, Qualitative Research
Original Paper, Computer applications to medicine. Medical informatics, name=Health Informatics, R858-859.7, 610, /dk/atira/pure/subjectarea/asjc/2700/2718, trusted research environment, data safe haven, 004, Artificial Intelligence, Privacy, Humans, TRE, Public aspects of medicine, RA1-1270, health data analysis, Computer Security, Confidentiality, Qualitative Research
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 22 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
