Our security promise

All Secure Data Environments are required to adhere to legal frameworks which ensure that the data they store and manage are used safely and properly.

Therefore, the Yorkshire & Humber SDE stores and manages datasets in accordance with:

Every SDE also complies with the Five Safes framework. This internationally recognised system promotes best practices in data security, and consists of:

  • Safe people: we make sure that only trusted researchers can access your data.
  • Safe projects: we approve projects that can help the health and well-being of communities.
  • Safe settings: secure technology is in place and the NHS data never leaves the SDE.
  • Safe data: we remove personal details from data to protect your privacy.
  • Safe outputs: all research outputs are checked to ensure people cannot be identified.

5 Step Circle

The Y&H SDE uses a Common Data Model that delivers the ultimate data security while allowing to re-run the analysis across multiple datasets. Committed to the best data security practices and respecting patients’ preferences, our SDE also upholds high-level privacy through such mechanisms as:

  • Data access controls
  • Data standards/models
  • Data de-identification/pseudonymisation
  • The Secure Data Environment guidelines

How the Y&H SDE keeps the data secure:

Information infrastructure:
Our SDE is built on a cloud-based data access platform Axym that was developed by a care system support organisation NECS. Axym offers a comprehensive solution that includes platform access and a robust Information Governance Framework, which is the base of its technical system.

Approval process:
Any researcher who wants access to data must have a clear and legal reason to do so for health and care purposes (never for insurance or marketing). Only the minimum amount of data needed to meet the specific purpose will be made available.

Research within the secure environment:
Axym includes analytical tools such as Sql server management studio, R studio, Python and Office 365. It means the analysis of de-identified data is conducted within the controlled environment. Other tools may be added into Axym with subject to security clearance and licensing agreements.

To learn more, read Yorkshire and Humber SDE Principles.