forked from uk-tre/glossary
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathuktre-glossary.yaml
More file actions
826 lines (813 loc) · 56 KB
/
uktre-glossary.yaml
File metadata and controls
826 lines (813 loc) · 56 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
categories:
- Analysis
- Computing
- Data Management
- Data in General
- Data in general
- Health Research
- Health Services & Health Data
- Identifiability
- Management
- Other
- Processes
- Research Management
- Risk Management
- Running and Overseeing Research
- Running and overseeing research
- Security Management
- Special aspects in the NHS Context
- UK law and rules
glossary:
- term: AAI
tags:
- Security Management
definition: |-
An abbreviation of "authentication and authorisation infrastructure", AAI refers to the technical mechanisms used to verify and manage users' access to computer systems.
See also: [Access Control]; [Authentication]; [Authorisation].
- term: Access Control
tags:
- Security Management
definition: |-
The technical mechanism for controlling a known (authenticated) user’s access to a system and its underlying assets such as data. Access control is also referred to as authorisation (and shorthanded as “AuthZ” to distinguish it from authentication), as it determines what the user is authorised to do.
See also: [AAI]; [Authentication]; [Authorisation].
- term: Administrative Data
tags:
- Data in general
definition: |-
See also: Administrative data in https://www.adruk.org/learning-hub/glossary/
- term: Algorithm
tags:
- Computing
definition: |-
A sequence of computational steps for processing data to achieve a particular outcome. Algorithms can range from the simple (add up a set of numbers) to the complex (use complicated mathematics to search for patterns in image data). Algorithms are usually described generally, as mathematics or in words, in contrast to computer programs which are written in specific computer languages.
- term: Analysis
tags:
- Computing
definition: |-
Also Data Analysis. Techniques that produce knowledge from organised information. Processes of inspecting, cleaning, transforming, and modelling data with the goal of highlighting useful information, suggesting conclusions and supporting decision making. Data analysis has multiple facets and approaches, encompassing diverse techniques under a variety of names, in different business, science, and social science domains.
See also: Data Analysis in https://terms.codata.org/rdmt/data-analysis
- term: Anonymisation
tags:
- Identifiability
definition: |-
The process of making personally identifiable data anonymous so that individuals can no longer be identified. In contrast to pseudonymisation, true anonymisation cannot be reversed.
See also: [Pseudonymisation].
- term: Application Deployment
tags:
- Computing
definition: |-
The process of installing, configuring, and making software applications available for use within a given enviornment (eg, a [TRE]).
- term: Application Programming Interface (API)
tags:
- Computing
definition: |-
A type of software interface that provides a way for two or more computer programs to communicate with each other. In contrast to a user interface, which connects a computer to a person, an application programming interface connects computers or pieces of software to each other.
- term: Application Stack
tags:
- Computing
definition: |-
A number of applications, tools and other software that work in concert to form a complete software solution.
- term: Artificial Intelligence (AI)
tags:
- Computing
definition: |-
A branch of computer science that aims to create technology and systems that perform tasks and make decisions in ways that resemble human intelligence. AI systems can be built in various ways, with the most common current method being Machine Learning.
Examples: A chess-playing computer program is an example of a specialised AI system (it can play chess, but nothing else). The programs inside a modern robot that can climb stairs and walk over uneven ground is an example of a more general AI system.
See also: [Machine Learning].
- term: Asset Management Process
tags:
- Management
definition: |-
A systematic approach to acquiring, operating, maintaining, and disposing of assets within an organisation, aimed at maximising their value and minimising risks.
- term: Authentication
tags:
- Security Management
definition: |-
The technical mechanism by which a computer user proves that they are who they say they are. Authentication is often shorthanded as “AuthN” to distinguish it from authorisation.
Example: The combination of a username and a password is a method of authentication.
See also: [AAI]; [Access Control]; [Authorisation].
- term: Authentication Application
tags:
- Security Management
definition: |-
A software system that verifies and validates the identities of users or entities accessing a system through authentication.
See also: [Authentication].
- term: Authentication Token
tags:
- Security Management
definition: |-
A piece of data used to authenticate the identity of a user or application to a computer system. Authentication tokens are often generated by authentication applications, and possession of a given token is evidence that the owner has successfully authenticated themselves to the system in question.
See also: [Authentication]; [Authentication Application].
- term: Automated Disclosure Control
tags:
- Computing
definition: |-
Disclosure control (qv) without the intervention of a human being each time. Automated disclosure control aims to capture the necessary rules for ensuring a given dataset cannot be used to identify any individual in an automated software system.
See also: [Disclosure Control].
- term: Authorisation
tags:
- Computing
definition: |-
Authorisation is a process of verifying that a person or other agent can legitimately take some action, such as gaining access to a dataset, editing a document, entering a building or making a payment. An administrative authority must determine whether there are sufficient grounds for authorising the action. Authorisation is often shortened to "AuthZ" to disntinguish it from authentication.
See also: [AAI]; [Access Control]; [Authentication].
See also: Authorisation in https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-A_79.xml
- term: Best Practice
tags:
- Processes
definition: |-
A set of guidelines that, if followed, is known to produce good outcomes. Best practice may be based on different levels of research evidence and/or collective experience.
- term: Big Data
tags:
- Data in general
definition: |-
Large amounts of information that, because of its scale, may need novel or non-standard methods to process. In the original coining, "big" referred to one or more of volume (the raw size of the data), velocity (the rate at which new data were generated) or variety (the complexity or richness of the data).
- term: Caldicott Guardian
tags:
- Special aspects in the NHS Context
definition: |-
A senior professional in the NHS who safeguards patient confidentiality and privacy. They are responsible for protecting patient information, including how it is used in, for example, research. Named after Dame Fiona Caldicott, the first UK National Data Guardian.
- term: Census
tags:
- Data in general
definition: |-
A survey of a national population which asks questions about age, gender, background and so on. In the UK, censuses are carried out every 10 years or so. Census information helps with things like local service planning and making important decisions. Census data can be used in academic research. If so, it is anonymised before being used.
See also: [Anonymisation].
- term: Characteristic
tags:
- Data in general
definition: |-
A piece of information about an individual, place or thing that is potentially useful in data analysis. For example, characteristics of a person might be age, gender, ethnicity, socioeconomic status and education level. If data about individuals were recorded in a table, the columns of the table might be characteristics.
- term: Chief Investigator (CI)
tags:
- Running and overseeing research
definition: |
The researcher with overall responsibility for a research project, including ethical approval, research staff management and conduct and project outcomes. Also known as a Principal Investigator.
- term: Clinical Trial
tags:
- Health Research
definition: |-
A research study conducted to test a new treatment, like a medicine or other therapy. When it comes to testing medicines, clinical trials are known as Clinical Trials of Investigational Medicinal Products (CTIMPs), and they have additional special rules and regulations that need to be followed. These rules ensure the safety and effectiveness of the new treatment being tested before it can be made available to the general public and the safety of the people participating in the trials.
- term: Clinical/ Medical/ Health Data or Healthcare data
tags:
- Health Services & Health Data
definition: |-
A person's information about their health or day-to-day health care. This information is collected as people see healthcare professionals, or have tests and treatments as part of their care. It is stored in electronic health records (EHRs) used by the NHS.
- term: Cloud computing
tags:
- Computing
definition: |-
A model of computer access or provision where users rent computer power remotely, rather than buying and installing their own hardware locally. Cloud computing may be described as "public cloud", meaning available to anyone from a wide number of cloud computing companies, or as "private cloud" or "on-premises" (or "on-prem") cloud, meaning installed and provided privately by, for example, a firm for its own uses.
Examples: Microsoft Azure, Amazon Web Services (AWS) and Google Cloud Platform (GCP) are large, public cloud providers.
- term: Cloud storage
tags:
- Computing
definition: |-
Computer data storage hosted by a cloud computing firm rather than provided locally. Access to cloud storage requires an Internet connection, in contrast to local storage which is either attached to a user's computer or needs only a local network connection.
Examples: Apple's iCloud storage, Google's Drive or Microsoft OneDrive are examples of cloud storage.
- term: Code Control
tags:
- Computing
definition: |-
The management and oversight of software code (programs) or source files, including versioning, change tracking, access control , and collaboration.
Contrast with: [Code Lists].
- term: Code Lists
tags:
- Data in general
definition: |-
A collection of specific, standard codes (labels) that are used in healthcare to represent different things, such as medical diagnoses, treatments, or procedures.
Contrast with: [Code Control].
- term: Command Line Interface (CLI)
tags:
- Computing
definition: |-
A text-based interface or environment that allows users to interact with a computer or software by typing commands or instructions, in contrast to a graphical user interface.
See also: [Graphical User Interface (GUI)].
- term: Common Workflow Language (CWL)
tags:
- Computing
definition: |-
An open standard for describing how to run software tools using command line interfaces, and how to chain them together to create workflows.
See also: [Command Line Interface (CLI)]; [Workflow].
- term: Compliance Checking
tags:
- Security Management
definition: |-
Related to Compliance in https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-C_42.xml
- term: Consent
tags:
- Processes
definition: |-
Consent is defined as individual providing freely given, specific, informed and unambiguous indication of their wishes to provide their data for processing relating to him or her.
Consent within the context of data protection regulation is one of the grounds (lawful bases) for lawfully processing personal data in relation to an individual and is specific towards particlar activities.
Research consent is the process of documenting an individual's choice to be involved in a research project(s) and typically called informed consent - this conveys that there is a process to allow participants to make a meaningful choiceInformed consent" is used to emphasise that understanding is crucial before agreeing, and typically applies when sharing personal data or participating in research studies. Research consent is commonly required for participation in clinical trials/research.
Broad consent is a mechanism of gaining the consent of an individual who donates their biosamples and health data with a view to their future use in research, and may not be specific to a particular research project at the time of collection.
Assent is the process of providing approval for data processing/involvement in research by an individual who is not legally eligible to do so (e.g. a child under the age of 16), and will be supported by an adult providing legal consent.
Withdrawal of consent is both a legal, and ethical right of the individual whose data is being processed, and must be respected in reference to data protection and research compliance. It allows an infividual to discontinue/rescind access to his/her data and prevent further processing.
See also: [Unconsented Data]
- term: Controls
tags:
- Security Management
definition: |-
In computer security management, measures, safeguards or mechanisms implemented to manage or mitigate risks and ensure the integrity, confidentiality, availability, and reliability of systems, processes, or data.
- term: Data
tags:
- Data in general
definition: |-
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-D_3.xml
See also: https://terms.codata.org/rdmt/data
See also: https://www.nice.org.uk/Glossary?letter=D
- term: Data Archiving
tags:
- Data Management
definition: |-
The practice of securely storing and preserving data in a read-only format for long-term retention, typically for compliance, historical reference, or reproducibility.
See also: https://vocabs.ardc.edu.au/repository/api/lda/codata/codata-research-data-management-terminology/v001/resource?uri=https%3A%2F%2Fterms.codata.org%2Frdmt%2Fresearch-data-management
- term: Data Classification
tags:
- Data Management
definition: |-
The categorisation or labelling of data based on its sensitivity, risk, value, or other attributes, often used to determine appropriate handling, storage, and security controls.
- term: Data Controller
tags:
- UK law and rules
definition: |-
A data controller is a person or organisation who decides how personal data, which is information about identifiable individuals, is used or handled. Examples of data controllers include NHS organisations like Trusts and GP surgeries. In the UK, most organisations handling personal data must register with the ICO (Information Commissioner's Office), and their details are public. Data controllers are legally responsible for how data is managed. They must prevent misuse, report breaches, and can be fined for failing to meet these duties.
See also: data processor, Information Commissioner's Office (ICO)
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-D_16.xml
See also: https://www.adruk.org/learning-hub/glossary/
See also: https://www.nice.org.uk/Glossary?letter=D
- term: Data Curation
tags:
- Data in general
definition: |-
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-D_17.xml
See also: https://terms.codata.org/rdmt/data-curation
See also: https://www.nice.org.uk/Glossary?letter=D
- term: Data Custodian
tags:
- Data Management
definition: |-
The person, organisation or other entity responsible for the data. They should control access to the data and protect the use of it and sharing of it (or subsets of it) to ensure regulations appropriate to the type of data are followed . This includes ensuring no private data is disclosed when it shouldn’t be.
- term: Data Deletion
tags:
- Data Management
definition: |-
The process of permanently removing or erasing data from storage systems or devices to ensure that it cannot be recovered or accessed.
- term: Data Discovery
tags:
- Processes
definition: |-
The process of identifying and accessing relevant data sources for research or analysis.
- term: Data Egress
tags:
- Data Management
definition: |-
The movement or transfer of data to infrastructure outside of a TRE either through manual or automated process. Often known as data outputs.
- term: Data Governance
tags:
- Processes
definition: |-
Policies, procedures, and regulations that govern the collection, storage, access, and use of data to ensure privacy, security, and ethical considerations are addressed.
- term: Data Ingress
tags:
- Data Management
definition: |-
The movement or transfer of data to infrastructure inside of a TRE either through manual or automated process. Often known as data inputs.
- term: Data Lifecycle Control
tags:
- Data Management
definition: |-
The management and oversight of data throughout its lifecycle, including storage, usage, sharing, retention, and eventual disposal.
- term: Data Literacy
tags:
- Data in general
definition: |-
The ability to understand, analyse, interpret, and critically evaluate data and data related studies.
- term: Data Minimisation
tags:
- Data Management
definition: |-
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-D_45.xml
- term: Data Mining
tags:
- Data in general
definition: |-
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-D_47.xml
See also: https://terms.codata.org/rdmt/data-mining
- term: Data Pooling
tags:
- Data Management
definition: |-
See also: https://www.nice.org.uk/Glossary?letter=D
- term: Data Processor
tags:
- UK law and rules
definition: |-
An entity that processes personal data on behalf of a data controller, following the controller's instructions. They do not have control over how the data is used and are only allowed to perform tasks as directed by the controller. For example, a company hired to manage an email service for another organization acts as a data processor. The processor cannot use the data for any other purposes, such as marketing, without the controller's consent.
- term: Data Protection Act (DPA)
tags:
- UK law and rules
definition: |-
UK law that regulates how personal data—information that can identify living individuals—is collected, used, and stored. It provides rules for organizations on data handling, ensuring privacy and security, while giving individuals rights to access, correct, and control their own data. It implemented UK-specific aspects of the GDPR and superseded previous UK legislation.
- term: Data Protection Impact Assessment
tags:
- UK law and rules
definition: |-
A process used to identify and minimize risks to personal data before it is collected or processed. It evaluates how data use might impact individuals' privacy and outlines steps to protect their information. A DPIA helps ensure that data handling practices are safe and secure, functioning like a risk assessment for personal data.
- term: Data Protection Officer
tags:
- UK law and rules
definition: |-
A professional responsible for ensuring that organizations comply with data protection laws when handling personal data. They advise on data privacy practices, monitor compliance, and act as a point of contact for data protection authorities. Organizations processing large amounts of personal data or those in the public sector are required to appoint a DPO, and they are listed on the public register held by the [Information Commissioner's Office (ICO)]
- term: Data Science
tags:
- Data in general
definition: |-
Data Science is a field focused on extracting knowledge and insights from data. It combines techniques from data management, computer science, and statistics to store, organize, and analyze data. Data science also involves applying this knowledge to specific problems, making it highly interdisciplinary, with experts from various backgrounds (such as clinicians and computer scientists) collaborating. Its goal is to uncover useful patterns and make data-driven decisions or predictions.
- term: Data Subject
tags:
- UK law and rules
definition: |-
See also https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-D_79.xml
- term: Data Transfer Agreement
tags:
- UK law and rules
definition: |-
A Data Transfer Agreement is an agreement or contract between a data controller and another organisation (such as a data processor), governing the transfer of data.
See also: [Data Controller], [Data Processor].
Related to: Data Transfer, see https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-D_82.xml
- term: Data Transfer Service
tags:
- Data Management
definition: |-
A service or system that facilitates the secure and efficient transfer of data between different systems, networks, or locations.
Related to: Data Transfer, see https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-D_82.xml and https://w3id.org/shp#DataTransfer
- term: Data Users
tags:
- Data in general
definition: |-
See also https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-D_85.xml
- term: Database
tags:
- Data in general
definition: |-
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-D_8.xml
See also: https://terms.codata.org/rdmt/database
- term: De-identification
tags:
- Identifiability
definition: |-
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-D_101.xml
See also: https://terms.codata.org/rdmt/de-identification
- term: Desktop
tags:
- Computing
definition: |-
The [Graphical User Interface] and environment presented to users on their computer screens, typically including icons, menus, and windows for interacting with applications and files.
- term: Desktop Applications
tags:
- Computing
definition: |-
Software applications designed to be installed and run on individual computers or [Desktop] systems, often providing specific functionalities or tools.
- term: Disclosure Control
tags: []
definition: |-
The process of review by approved staff at a Trusted Research Environment (TRE) of any research or analysis results prior to their release from the TRE. The aim of disclosure control is to ensure there are no risks of identifying individuals in any released research results.
Related to: Disclosure Control Methods https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-D_142.xml
Related to: Disclosure Check https://w3id.org/shp#DisclosureCheck
- term: Egress/Ingress Control
tags:
- Security Management
definition: |-
The implementation of measures or controls to control and monitor the movement of data into and out of the TRE, to prevent sensitive data from leaving the TRE. Often known as output/input checking, or in the case of egress, disclosure control.
See also: [Disclosure Control]
- term: Electronic Health Record (EHR)
tags:
- Health Services & Health Data
definition: |-
A person’s health records that are held digitally on a computer (as opposed to on paper). Also known as an electronic patient record (EPR).
- term: Ethical approvals
tags:
- Running and Overseeing Research
definition: |-
Ethical approvals are like getting the green light from a group of experts who make sure that research is done in a proper and respectful way. They ensure that participants' rights are protected and everything is conducted responsibly. It's like having a permission slip before starting the research to ensure everything is fair and safe.
- term: European Union (EU) General Data Protection Regulation (GDPR)
tags:
- UK law and rules
definition: |-
The 2016 GDPR set out the EU framework for the handling of data relating to identifiable living people. Among many other things, it sets out a variety of legal bases for using personal data, such as “the data subject has given consent”, “a task... in the public interest”, or for “scientific... research”. The UK DPA was framed in its terms and set out UK-specific aspects. When the UK left the EU in 2020, the GDPR remained in UK law as the “frozen GDPR” or “UK GDPR”.
- term: External Audit
tags:
- Management
definition: |-
An independent assessment or review of the TRE organisation's controls, processes, or compliance conducted by external auditors or audit firms.
- term: FAIR Data
tags:
- Data in general
definition: |-
FAIR data is a set of principles ensuring data is:
Findable: Easy to locate through clear identification and metadata
Accessible: Retrievable through standard methods, even if authentication is needed
Interoperable: Can work across different systems and with other datasets
Reusable: Well-documented and properly licensed so others can use it
See also: https://terms.codata.org/rdmt/fair-data
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-F_3.xml
- term: Federation
tags:
- Processes
definition: |-
A grouping of organisations with their own policies and assets (e.g. datasets or computing resources) who agree to allow use of those assets by the broader group but without the assets leaving control or ownership of the organisation.
Ordinary real-world examples of this are the United States of America, Germany or Australia, where member states have individual laws and governance but also subscribe to central policies to enable and encourage working together.
- term: Federated Analytics
tags:
- Computing
definition: |-
Federated analytics is when data analysis happens across multiple independent organisations, with each organisation keeping complete control of their own data. Instead of combining all data in one place, the analysis methods are sent to each organisation's data. For example, multiple hospitals could participate in medical research by running the same analysis on their local patient records, then sharing only the summarized statistical results - like average patient outcomes or treatment effectiveness. The raw patient data never leaves each hospital's secure system, but researchers can still draw insights from the combined statistical findings across all participating hospitals
- term: Federated Data
tags:
- Computing
definition: |-
Federated data is when different organizations keep full control of their own data but agree on ways to safely share access to it for specific purposes. Each organization maintains its own data security and rules, but allows approved users to work with the data through agreed-upon tools and systems. For example, research institutions might share access to their datasets while keeping the data within their own secure environments, allowing collaborative research without moving sensitive data to a central location
- term: Federated Identity Mapping
tags:
- Computing
definition: |
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-F_15.xml
- term: Federated Learning
tags:
- Computing
definition: |-
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-F_16.xml
- term: Federation Operator
tags:
- Management
definition: |-
An organization or entity responsible for managing a federated identity system or network. In such systems, multiple independent organizations (known as "federated members") collaborate to enable secure, streamlined access to resources or services without requiring users to maintain separate credentials for each participating member.
- term: Federated Query
tags:
- Computing
definition: |-
See [Federated Analytics]
- term: Firewall
tags:
- Security Management
definition: |-
A security device—either hardware, software, or a combination of both—that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Its primary purpose is to establish a barrier between a trusted, secure internal network and untrusted external networks, like the internet, to protect against unauthorized access, cyberattacks, and other potential threats.
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-F_23.xml
- term: Five Safes
tags:
- Processes
definition: |-
The Five Safes framework is a set of principles developed to guide researchers and organizations in handling sensitive data.
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-F_26.xml
- term: Graphical User Interface (GUI)
tags: []
definition: |-
A way of interacting with a computer system based on visual presentations of documents, applications and so on as windows on a screen. Users interact with a GUI using pointing devices (e.g. a mouse or a finger) rather than having to type everything.
Contrast with [Command Line Interface].
- term: Identifiable Data
tags:
- Identifiability
definition: |-
Data that can be used to identify, contact, or locate a specific individual, either by itself or when combined with other available information. This includes direct identifiers like full names, NHS numbers, and email addresses; indirect identifiers such as date of birth or workplace that could identify someone when combined; and context-dependent identifiers like IP addresses or device IDs. For example, while a person's age alone might not identify them, combining it with their job title and city of residence could make them identifiable – such as "a 45-year-old pediatric surgeon in Bolton, Greater Manchester" might be specific enough to identify a particular individual, even without naming them directly. This type of data requires special handling under various privacy regulations like GDPR to protect individuals' privacy and prevent unauthorized access or misuse.
See also: https://terms.codata.org/rdmt/direct-identifier and https://terms.codata.org/rdmt/indirect-identifier
See alos: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-I_5.xml
- term: Identity and Access Management Services
tags:
- Security Management
definition: |-
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-I_18.xml
- term: Identity Verification
tags:
- Security Management
definition: |-
The process of confirming or authenticating the identity of individuals or entities, often through the verification of personal information, credentials, or biometric data.
- term: Information Asset Owner
tags:
- Data Management
definition: |-
An individual or role accountable for managing and overseeing an information asset, including their acquisition, use, maintenance, and protection.
- term: Information Commissioner's Office (ICO)
tags:
- UK law and rules
definition: |-
The UK’s independent authority for upholding information rights in the interest of the public.
The ICO oversees the application of the Data Protection Act and the UK GDPR, and has the power to issue monetary pentalties for infringement of dat protection legislation.
- term: Information Governance (IG)
tags:
- UK law and rules
definition: |-
How an organisation takes care of its information or data. It involves strategies and processes for defining, collecting, storing, securing, using, protecting and disposing of data safely, while also respecting privacy. IG ensures that data is managed well throughout its life cycle, following guidelines and laws. It helps organisations handle data responsibly, protect it from risks, and use it in a way that follows rules and keeps people's information safe.
Information governance also identifies the processes to be followed in the event of a failure to protect personal data, and any reporting, or escalation to regulatory bodies if necessary,.
- term: Internal Audit
tags:
- Management
definition: |-
An independent evaluation process performed within the TRE organisation that assesses and improves its internal controls, risk management, and governance.
- term: Interoperability
tags:
- Computing
definition: |-
The ability of two or more systems, devices, or applications to exchange and use information seamlessly. Interoperability enables these systems to work together, often through the adoption of open standards, that facilitate consistent communication and data sharing without requiring custom intergration. Good interoperability promotes collaboration, scalability, and the extension of services by allowing different systems to work together in a standarised, vendor-neutral way, thereby reducing techinal and operational barriers.
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-I_65.xml
- term: Issue Management Process
tags:
- Computing
definition: |
A systematic approach to identifying, tracking, resolving, and managing issues or problems that arise within a TRE organisation, aiming to minimise their impact and ensure timely resolution.
Common mechanisms to manage the effective resolution of such issues can include Corrective and Preventive Actions (CAPAs), which enable such instances to be documented and provide an audit trail of activities undertaken to prevent recurrence.
- term: IT Service Provider
tags:
- Computing
definition: |-
A company, department, or entity that delivers information technology services or support to internal or external clients, such as network management, software development, or helpdesk support.
- term: Lawful Basis
tags:
- UK law and rules
definition: |-
On 25 May 2018 the General Data Protection Regulation (“GDPR”) came into force. From this date, you must have a defined lawful basis to hold and use ‘personal data’. The Health Research Authority (HRA) and Information Commissioner’s Office (ICO) advise that for almost all research conducted in the UK organisations should rely on either: (1) ‘Task in public interest’ – for all public bodies (NHS / HSC, Universities, UKRI etc), or (2) ‘Legitimate interest’ – for non-public bodies (charities etc.)
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-L_3.xml
- term: Linkage of data (data linkage)
tags:
- Processes
definition: |-
Joining two or more sets of data together using one (or more) pieces of information common to all (often called "common keys"). Linkage may be based on straightforward rules (“two records with the same NHS number are from the same person”) or based on probability (“if two records share the same forename, surname, and date of birth, they are more likely to be from the same person”). Links may be made using identifiable data (e.g. NHS number) or de-identified data (e.g. a research pseudonym).
For example: joining a health dataset with an employment dataset using a common key based on individual names and addresses.
- term: Longitudinal Dataset
tags:
- Data in General
definition: |-
A collection of data related to the same group of people over a long time to see how things change. This may involve asking the same questions at different ages.
- term: Machine Learning (ML)
tags:
- Analysis
definition: |-
A computer programming technique particularly suited to identifying patterns or rules in large amounts of data. Rather than beginning with a fixed set of rules, an ML program builds up ("learns") a set of likely rules by processing many example datasets (this stage of ML is known as "training"). When the set of likely rules is complete, the ML program can apply them to new datasets and offer a likely prediction (this stage is known as "inference").
For example: an ML program trained to recognise car numberplates would be trained on many pictures of car numberplates, building up a set of likely rules that will enable to program to "recognise" car numberplates in the future.
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-M_2.xml
- term: Malware Scanning Application
tags:
- Security Management
definition: |-
A software application or tool that scans and detects malicious software or malware on computer systems or networks, aiming to prevent security breaches or infections.
- term: Metadata
tags:
- Data in general
definition: |-
Metadata is data that describes or provides information about other data. It is used to provide context, meaning, and structure to data, and helps to make it easier to understand and use. Metadata can describe various aspects of data, such as its content, format, structure, origin, quality, and usage.
- term: Minimum Viable Product (MVP)
tags:
- Computing
definition: |-
A minimal viable product (MVP) is a version of a product or service that has the minimum set of features and functionality required to meet the needs of early adopters or customers. The goal of an MVP is to quickly validate the product idea and test the market demand, while minimizing development costs and time-to-market.
- term: Monitoring
tags:
- Management
definition: |-
The continuous or periodic observation, measurement, or tracking of systems, processes, activities, or events to ensure compliance, performance, or security.
- term: National Data Guardian
tags:
- Special aspects in the NHS Context
definition: |-
The National Data Guardian (NDG) for Health and Social Care is an independent champion for patients and the public when it comes to matters of their confidential health and social care data, and appointed by the Secretary of State for Health and Social Care by statute . To support the development and maintenance of trustworthy systems and practices, the NDG provide advice, encouragement, and challenge to the health and social care system on the safe, appropriate, and ethical use of people’s confidential health and care information.
The NDG advise the UK government and NHS on the processing of health and adult social care data in England. Both the Caldicott Guardian and the National Data Guardian protect patient information. The Caldicott Guardian focuses on data protection within individual healthcare organisations.
- term: National Data Opt-Out (NDO)
tags:
- Special aspects in the NHS Context
definition: |-
By default, patients are included in the system. But if you don't want your private information to be shared, you can choose to opt-out using the National Data Opt-out in England and Wales.
The NHS National Data Opt-Out allows you say 'no' to sharing your personal information for things like research without asking you first. This comes from the NHS Act Section 251 and the requirements outlined in the UK GDPR and Data Protection Act.
When you decide to opt-out, your personal information remains exclusively for your medical care.
- term: Natural Language Processing (NLP)
tags:
- Analysis
definition: |-
NLP is a field of artificial intelligence (AI) that enables computer software to analyse, interpret, and generate human language. NLP allows machines to extract meaningful information from text, identify key details, uncover patterns, and detect trends within large volumes of text data, but faces challenges because words can have different meanings depending on their context, and the software cannot understand emotions or the intentions behind why certain words were chosen. Examples of NLP in the TRE space include: identifying symptoms, diagnoses and treatments in electronic health records; identifying references to mental health concerns such as suicidial thoughts, self-harm, or changes in mode from clinicians notes; and programs to automatically identify patients based on eligibility criteria for research studies or clinical trials, employment history or status over time, or students' academic progression over time.
- term: On-premises
tags:
- Computing
definition: |-
Also "on-prem". See [Cloud Computing].
- term: Opt in
tags:
- Health Research
definition: |-
An active choice, made by a participant or individual to be involved "in" research or provide their data for a research project. This is not a passive action, and cannot include individuals who have automatically been included.
- term: Opt out
tags:
- Health Research
definition: |-
An active choice, made by a participant or individual to not be be involved in research or provide their data for a research project. This can include idividuals who choose to not be included, or withdraw their consent to their data being included and are therefore excluded or "out" of any analyses of the data.
- term: Patient and Public Engagement (PPE)
tags:
- Health Research
definition: |
A purposeful set of activities designed to promote an ongoing two-way dialogue with the public about data and research, driven by active listening and responding.
Example: A researcher attending science festivals to enhance the public’s understanding of a specific topic through engaging and interactive activities.
See also: [Patient and Public Involvement (PPI)]
- term: Patient and Public Involvement (PPI)
tags:
- Health Research
definition: |
Patients and the public are included in the decision-making process within a piece of work or research. By providing their own insights and advice from personal experience they can offer unique and valuable perspectives throughout the planning, development and implementation stages.
See also: [Patient and Public Engagement (PPE)]
- term: Peer Review
tags:
- Health Research
definition: |-
A thorough evaluation process to ensure the quality and validity of scientific studies before they are shared publicly. Reviewers assess the research by looking at things like the methods used and whether the conclusions are supported by the results. They may suggest changes before recommending publication, or they may advise against publishing.
- term: Personal Data
tags:
- Data in general
definition: |-
UK data protection regulation defines personal data as any piece of information that someone can use to identify, with some degree of accuracy, a living person. It is also something which can confirm your physical presence somewhere.
- A name and surname
- A home address
- An email address
- An identification card number
- Location data
- An Internet Protocol (IP) address
- The advertising identifier of your phone
Personal data can also be sensitive (or Special Category data). For more information see Sensitive Data.
- term: Principal Investigator (PI)
tags:
- Running and overseeing research
definition: |-
The researcher in charge of a project or study at a particular site (e.g. hospital or university). The PI is responsible for overseeing the study's progress, coordinating with the team members involved, and ensuring that the research is conducted according to the approved plan. The PI plays a crucial role in managing the study.
- term: Private Cloud
tags:
- Computing
definition: |-
See [Cloud Computing].
- term: Pseudonymisation
tags:
- Identifiability
definition: |-
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-P_140.xml
See also: https://ico.org.uk/media/1061/anonymisation-code.pdf
- term: Public Benefit
tags:
- Health Research
definition: |
Also known as ‘public good’, research or activity which is motivated by its benefit to society. This work often aims to provide evidence for public policies, services or decisions to ultimately improve lives.
Example: health data research to learn more about the causes, characteristics, or effects of a disease or condition, and how to best treat it, to improve health and care of patients and the public.
- term: Public Cloud
tags:
- Computing
definition: |-
See [Cloud Computing].
- term: Public Dissemination
tags:
- Processes
definition: |-
Communicating the findings of a research project or project information with the general public.
- term: Qualitative Analysis
tags:
- Analysis
definition: |-
Analysis without numbers means studying information based on qualities rather than quantities. Instead of focusing on numbers and statistics, this type of analysis looks at themes. It often involves interpretation and exploration, trying to understand the meaning behind the information.
For example: Qualitative analysis would be the best way to process interviews with people in which their perspectives and experiences were recorded.
- term: Quantitative Analysis
tags:
- Analysis
definition: |-
Analysis using numbers means studying data by focusing on quantities and measurements. This involves using mathematical and statistical methods to analyse and interpret the information. Researchers look at numerical values, such as counts, percentages, averages, or correlations, to gain insights and draw conclusions from the data. This type of analysis allows for objective and quantitative assessment of trends, patterns, and relationships within the data.
- term: Registry
tags:
- Computing
definition: |-
A centralised database, repository, or system that stores and manages information, configurations, or records related to specific entities, such as users, systems, or resources.
- term: Relational Database
tags:
- Data in general
definition: |-
An organised collectiom of data, where data are related to each other in a systematic manner so that they can be reorganised and accessed in a number of different ways. A relational database may house one or many datasets.
See also: https://vocabs.ardc.edu.au/repository/api/lda/codata/codata-research-data-management-terminology/v001/resource?uri=https%3A%2F%2Fterms.codata.org%2Frdmt%2Fdatabase
- term: Research Approvals
tags:
- Running and overseeing research
definition: |-
All research that involves data from individuals must get approval from an authorised body. For research with NHS data, for example, this would be the NHS Research Ethics Committee (REC). Approvals committees often include both researchers and members of the public, and their job is to make sure that the research is planned and conducted in a fair and ethical way and that it benefits the public.
- term: Researcher(s)
tags:
- Other
definition: |-
Individuals or groups who utilise and analyse data for research purposes or as part of their work, such as scientists, analysts, or other professionals.
- term: Risk Assessment
tags:
- Risk Management
definition: |-
The systematic evaluation and analysis of potential risks, threats, or vulnerabilities, including their likelihood, potential impact, and the effectiveness of existing controls or mitigation measures.
See also: https://www.elgaronline.com/display/book/9781035300921/b-9781035300921-R_69.xml
- term: Routinely Collected Data
tags:
- Health Services & Health Data
definition: |-
Data, often about people, collected by health, social, or school services during their everyday tasks, like doctor visits or school days. This is also known as "routinely collected data" or "real-world data."
This data is not specifically gathered for research purposes.
For example routinely collected health data includes details about a patient's medical history, diagnoses, treatments, medications, etc.
- term: Sensitive Data
tags:
- Data in general
definition: |-
UK Data Protection Regulaiton (UK GDPR) defines sensitive data as Special Category Data and is subject to specific processing conditions under the UK GDPR: personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs; trade-union membership; genetic data, biometric data processed solely to identify a human being; health-related data; data concerning a person’s sex life or sexual orientation.
Commercial data such as retail information, business details, IP (intellectual property) and Copyright information or confidential product details is also be considered sensitive data.
Data sensitivity is be classified at an institutional level within policy documents (e.g. highly confidential, confidential, not classified) with handling requirements and placed on the different levels of confidetiality required. See [Personal Data]
- term: Socio-demographic factors
tags: []
definition: |-
Characteristics of individuals or populations related to social and demographic aspects such as age, gender, ethnicity, socioeconomic status, and education level.
- term: Statistical Disclosure Control
tags:
- Identifiability
definition: |-
The process of ensuring data such as analysis results that are being taken out of a TRE are properly anonymised to ensure no-one can figure out the identity of specific individuals.
- term: Structured Query Language (SQL)
tags:
- Computing
definition: |-
A computer programming language designed to organise and work with information stored in relational databases. It allows people to find and use data from databases easily. [BS comment: Do we need a definition for 'relational database'?]
- term: Structured Data
tags:
- Data in general
definition: |-
Structured data is organised and formatted using pre-defined rules, so that computational analysis is easier. For example, structured data is often stored as tables in a database where each column represents a different type of information (like numbers or words), and each cell in the table holds a single piece of data. This organisation helps with sorting, searching, and understanding the data more easily.
See also [Unstructured Data]
- term: Study Closure
tags:
- Research Management
definition: |-
The formal conclusion of a research study or project, including final data analysis, reporting, documentation, and archiving.
- term: Study Onboarding
tags:
- Research Management
definition: |-
The process of onboarding or initiating a research study, including setting up necessary infrastructure, obtaining approvals, and defining protocols or methodologies.
- term: Study Register
tags:
- Research Management
definition: |-
A centralised record or database that tracks and manages information about research studies or projects.
- term: Supplier Management and Monitoring process
tags:
- Management
definition: |-
A structured approach to managing and monitoring relationships with external suppliers, vendors and contractors, including selection, contract management and compliance oversight.
- term: Technology Stack
tags:
- Computing
definition: |-
The set of technologies (such as programming languages) that work together to implement a software solution.
- term: Text Analytics
tags:
- Computing
definition: |-
The process of examining and understanding written information, like electronic health records or other text-based content, to find important and useful insights. It involves analysing the text to identify patterns, trends, or valuable information that can be used for various purposes, such as research or decision-making.
- term: Trusted Research Environment (TRE)
tags:
- Processes
definition: |-
A class of computer systems which enable researchers to access sensitive datasets across administrative boundaries whilst ensuring that overall control of the data stays with appropriate governance authorities. TREs include Secure Data Environments (SDEs) in the National Health Service in England, Safe Havens in Scotland, processing environments as defined in the Digital Economy Act 2017 (DEA) and Secure Processing Environments as defined in European Health Data Space legislation. TREs are typically operated according to information governance practices and processes modelled on the [Five Safes] approach developed by the Office for National Statistics (ONS).
- term: TRE Infrastructure
tags:
- Computing
definition: |-
The set of computing resources used to implement and support a TRE. This may include desktop computers, databases, networking devices, firewalls etc. These resources may be physical (hardware owned by the TRE) or virtual (e.g. resources operated by a cloud provider).
- term: Unconsented Data
tags:
- Data in general
definition: |-
Personal data used for secondary purposes (such as research) where a specific, demonstrated public benefit is proven, usually with Article 6 and Article 9 in the General Data Protection Regulations as the legal basis for undertaking that secondary use of that data (as opposed to individual consent).
See also: [Consent]
- term: Unstructured Data
tags:
- Data in general
definition: |-
Personal data used for secondary purposes (such as research) where a specific, demonstrated public benefit is proven, usually with Article 6 and Article 9 in the General Data Protection Regulations as the legal basis for undertaking that secondary use of that data (as opposed to individual consent).
See also: [Consent] [European Union (EU) General Data Protection Regulation (GDPR)]
- term: User Documentation
tags:
- Computing
definition: |-
Written materials, guides, manuals, or instructions to assist users. Documentation typically includes information on features, step-by-step procedures and best practices to make it easier for Users to work. An example of this would be user manuals, quick start guides or troubleshooting sections on websites.
- term: User Interface (UI)
tags:
- Computing
definition: |-
See [Graphical User Interface]; [Command Line Interface]
- term: User Onboarding
tags:
- Computing
definition: |-
The process of introducing and integrating users into an organisations systems and processes. It helps people understand features and learn how to use something effectively. For example, when you download a new app, there is often a step-by-step tutorial on how to make the most of the software.
- term: Variable
tags:
- Data in general
definition: |-
A variable is any characteristic, number, or quantity that is represented in a dataset for each observation. In data analysis,a variable is a symbolic name to represent different types of information in datasets. For example, date of birth is a variable representing when a person was born.
See also: [Characteristic]
- term: Workflow
tags:
- Computing
definition: |-
Specifically a computational workflow is a set of chained operations used to carry out a particular analysis or other computational task. Workflows simplify complex sequences of activities and enable researchers to automate and track the provenance of the work in workflow execution. Workflows can often be visualised as a network or tree of operations.