The TRE infrastructure provides data protection and security assurances, demonstrated with appropriate accreditations.
AR(s) must access data on a device that meets the security requirements of the HO and UO (typically not a personal device), shall not leave it unattended while accessing the TRE and shall protect the screen from onlookers.
No remote access to the TRE from outside permitted locations defined in the project approval process.
|
End user security requirements specified by the HO.
Terms for researcher access via Virtual Private Network (VPN) at other locations within UK.
Restrictions on international access and additional terms required for international access.
The protocol on monitoring and audit of access and use of the TRE.
|