Access to data that is placed in dbGaP is controlled via the Data Access Request (DAR) process. Traditionally, after approval, a user downloads the data from dbGaP and there is no further direct control or monitoring of how the data is used or potentially redistributed. Within BDC, while access is managed in the same way as dbGaP, the data cannot be downloaded from BDC and all use of the data is logged and monitored. Therefore, the risk of unintended use of the data is reduced in BDC.
How is the risk of data being used improperly reduced compared to dbGaP? Print
Created by: Paul Kerr
Modified on: Fri, 13 Jan, 2023 at 11:35 AM
Did you find it helpful? Yes No
Send feedbackSorry we couldn't be helpful. Help us improve this article with your feedback.