SREDH Consortium Governance

 The SREDH Consortium places a strong emphasis on governance in all its operations. As the central hub for data access and usage, the consortium ensures that the highest standards of security and integrity are upheld. Only approved consortium members are granted access to the prized research environment, and the Working Groups (WGs) are responsible for evaluating and approving individuals. The WGs acts as a gatekeeper, meticulously ensuring that only authorized and trustworthy individuals gain entry to the platform. The scrutiny applied by the committee acts as a safeguard, ensuring that the consortium remains a space reserved for individuals with a genuine need for access.

 To become a member of the Working Group (WG), a systematic process is followed. For investigators and partner organizations, individuals can either self-nominate or submit a WG membership application for non-investigators and non-partner organizations. The nominated individuals or organizations undergo scrutiny by the Project Advisory Committee, comprising representatives from the CIA and partner organizations, seeking assessment and approval. The committee then determines the level of data access for each nominee. Subsequently, the approved members submit their membership applications to the SREDH Consortium, which reviews these applications and grants data access based on the pre-approved level. To ensure ethical considerations, members may need to seek or amend ethics approval from UNSW. Once all approvals are in place, access to the data is granted, and individuals receive invitations to join the WG. This meticulous process ensures a thorough evaluation and adherence to ethical standards before granting access to the consortium's data and welcoming members into the Working Group.

Approved users undergo a multi-factor authentication process as an additional layer of defense. This stringent protocol demands multiple forms of verification before granting access, making unauthorized entry a formidable challenge. By incorporating this additional step, the SREDH consortium governance establishes a robust fortress around its data, fortifying its defenses against potential breaches.

In essence, the governance structure within the SREDH consortium is a multi-faceted shield, incorporating meticulous approval processes, project-specific access controls, and advanced authentication measures. This comprehensive approach not only safeguards the integrity of the research environment but also underscores the consortium's commitment to upholding the highest standards of data governance.