Linkage and Security

Linkage and Security


The PHRN has been developing a robust data information security program designed to offer the highest level of protection to data involved in linkage and research.

Information security controls used by the PHRN's Data Linkage Units (DLUs) can be divided into four key categories:

Physical Security - DLUs must ensure strict security barriers and entry controls are in place at all locations where data records are stored

IT Security - Stand-alone networks, firewalls, password protection, anti-viral software and encryption for data transfer must be standard practice at all PHRN DLUs

Personnel Security - access to data limited to those personnel whose work responsibilities specifically require it

Administrative Security - extensive work has been completed on a range of approved written policies, procedures, standards, guidelines, security training, and risk assessments that will help guide the ongoing security management of all PHRN DLUs. External reviews have also been completed.

There are a number of security measures also undertaken to ensure the data remains safe once provided to the approved researchers. These include:

  • approval of security plans from Human Research Ethics Committees and data custodians
  • legally binding contracts and confidentiality agreements with data custodians
  • successful completion of compulsory online researcher training covering privacy and security
  • receive data from custodians in encrypted format

Secure Data Access

Secure Unified Research Environment (SURE)

A range of information security controls relating to the access, storage and transmission of data have been built into the design of the SURE facility:

  • SURE access is strongly authenticated.
  • SURE is hosted in a tier-3+ (i.e best available) data centre in Sydney that is also used by some of Australia's leading telecommunications, government and financial institutions. The data centre is a member of the Australian Government Data Centre Facilities Panel.
  • No data is stored on a researcher's local computer or institutional computing environment.
  • Within SURE, a user cannot access the internet, email, print or copy data to a USB memory stick or to other removable media. All files moving into or out of SURE pass through the Curated Gateway. Files are subject to review as they pass through a purpose built portal called the Curated Gateway before they can be accessed within or outside the SURE facility.
  • Regular on-site and off-site backups of data are made. All off-site backups and archival data are encrypted prior to being transferred to secure off-site storage.
  • All users are required to undertake training on issues of privacy, ethics, information security and statistical disclosure control prior to gaining access to SURE and sign a deed outlining the terms and conditions of using SURE.

The following sections relate specifically to the logical security controls for SURE.

Computer and network security

  • Functions of the operating system or applications which are not necessary for undertaking research activities have been restricted to enhance the security of SURE.
  • Intrusion detection and prevention systems are in place to prevent against attacks and maintain integrity of data on the system.


  • SURE infrastructure users are required to select strong passwords following guidelines issued by SURE Team members when providing access information.
  • Passwords are to be kept confidential and not shared with anyone.

Authentication tokens

  • In addition to a secret password, users of SURE are required to use an additional physical or electronic authentication token for additional security protection.

Data security

  • SURE infrastructure users are to be aware of, and abide by, legislative and ethical requirements related to the use of data for research purposes.
  • All files entering or leaving the SURE facility need to pass through the Curated Gateway. Both inbound and outbound files will be reviewed to assess their risk of disclosure. Files will be reviewed by the study's chief investigator or a member of the SURE Team depending on individual study requirements.
  • Copies of inbound and outbound files are kept and activities logged to allow audits to be completed.

Physical security

  • Physical servers are stored in a secure data centre with strict access controls and continuous staffed surveillance.
  • Checks will be run on each device accessing SURE, including mobile or portable devices, to check for current anti-virus protection and the installation of important updates to a device's operating system. If the local computer does not pass these minimum security requirements, access will be denied.

Information security incident management

  • SURE infrastructure users are required to report an information security incident to the contact officer listed on the SURE website and undertake other actions as directed. Incidents include the identification of an unwanted or unexpected system, network or service state or another situation that may be deemed security-relevant.
  • SURE staff will investigate an information security incident following documented procedures and roles.
  • SURE staff will communicate to users any service disruptions as a result of an information security incident as quickly as possible.

Business continuity

  • Plans for business continuity and disaster recovery are in place to ensure that the impact of natural disasters, attacks or loss of essential services is minimised and clear processes and contingencies are in place to restore operations as soon as possible.

Backup and recovery

  • Comprehensive backup and restoration processes are in place and regularly tested.

Change control

  • Changes to the IT environment are assessed for information security risk before they are implemented.

File retention and disposal

  • Following the closure of a SURE project workspace, remaining files will be securely archived. Files will be retained for the period that has been directed by the project ethics approval and/or applicable legislation (the maximum will hold).
  • Once the retention period has passed, files will be destroyed using secure methods that will ensure that data is completely overwritten and/or the storage medium is physically destroyed and there is no possibility that the records can be retrieved.

Breaches and infringements

  • Any alleged breach or infringement related to the use of SURE will be investigated as outlined in SURE Agreements, which is consistent with the Australian Code for the Responsible Conduct of Research.

For more information visit theĀ Sax Institute