Need Help?

SAFIR02_Agilent

Genomics to select patients with metastatic breast cancer for targeted therapy (microarray_agilent)

Request Access

DAC to have access to "Genomics to select patients with metastatic breast cancer for targeted therapy" data

Preamble Gustave Roussy set up a Data Access Committee (DAC) to process requests for access to the “Genomics to select patients with metastatic breast cancer for targeted therapy” data. Article I. Data Access Committee Article I.1 Composition Gustave Roussy's DAC is composed of Fabrice Andre, Marta Jimenez and Alicia Tran Dien. Article I.1 Missions Gustave Roussy's DAC is responsible for authorizing access to the data. Article II. Request for access to data Article II.1 Composition of the application file The data access request requires: - A summary of the study (synopsis template will be send after request) : it can be very light: we just need to know the general question that is going to be addressed; - The CNIL declaration (will be send after request) : we can take care of the submission part to the CNIL, once we receive it; - The standard contractual clauses signed (will be send after request) if your country is located outside of the European Community (check if your country is concerned : https://www.cnil.fr/en/data-protection-around-the-world) - The opinion issued by an Institution Review Board / or ethical committee that evaluated the project and the composition of the committee(s), if any; - The confidentiality form (will be send after request); - The documentation necessary to demonstrate compliance with all its data protection and security obligations (a security charter); - This data access policy signed Article II.2 Application procedures The request for access to the data is free. It is done by mail to the following addresses FABRICE.ANDRE@gustaveroussy.fr m-jimenez@unicancer.fr ALICIA.TRAN-DIEN@gustaveroussy.fr Article II.3. Examination of applications Following the filing of the file with the DAC, the latter: - verify its good orientation and completeness. Otherwise, the DAC will contact the requester for further information; - instruct the request for access to the data within one month after receiving the complete file. This time is given as an indication. Article III. Conditions of use of the data The applicants undertake to respect all the following measures and to have them respected by their staff as well as any other person(s) assisting them with the use of the data: - To collect only data adequate, relevant, limited and strictly necessary to the specific treatment that it with these data; - Do not use the data to which they can access for purposes other than those indicated in the application file; - Disclose this data only to persons duly authorized by reason of their duties and who have been indicated in the data access request file; - Do not make any copy of this data except that it is necessary for the execution of their research; - Take all necessary measures to avoid misuse or fraudulent use of this data; - Ensure that only secure means of communication will be used to transfer this data; - At the end of the research project, to fully restore the data, computer files and any information related to these data. When this task falls within its remit, the applicants undertake to ensure that the persons from whom they collect and / or use the data have been previously informed of the specific treatment that they are carrying out with their data. Article IV. Notification of data breach As soon as it becomes aware of this and within a maximum of twenty-four (24) hours, the requester notifies the DAC of any data breach. The requester provides to the DAC at the time of notification of the incident, or if this is not reasonably possible as soon as possible after the notification of the data breach, the following information regarding their violation: 1) The nature of the data breach; 2) The estimated number of people involved; 3) Categories of the person(s) involved; 4) The categories of Data concerned; 5) The estimated number of Data violated; Measures taken to remedy the data breach, including, measures to limit adverse effects and potential risks. The applicants shall as far as possible assist the DAC in reporting the data breach to the relevant control authorization and / or to the person(s) involved in the data breach. Article V. Data destruction At the end of the search, the applicants undertake, after having made sure of the terms relating to reversibility: - Destroy all data - Return all data to the DAC - Return the data to the subcontractor designated by the DAC The return must be accompanied by the destruction of all data (including copies) in the information systems of the applicant and their collaborators. First and last Name : Facility attached to : Date and place : Signature preceded by the mention ‘I pledge to respect this Data Access Policy or will be subject to legal penalties’

Studies are experimental investigations of a particular phenomenon, e.g., case-control studies on a particular trait or cancer research projects reporting matching cancer normal genomes from patients.

Study ID Study Title Study Type
EGAS00001005587 Other

This table displays only public information pertaining to the files in the dataset. If you wish to access this dataset, please submit a request. If you already have access to these data files, please consult the download documentation.

ID File Type Size Located in
EGAF00005574667 txt.gz 19.4 MB
EGAF00005574668 txt.gz 19.5 MB
EGAF00005574669 txt.bz2 15.8 MB
EGAF00005574670 txt.bz2 15.6 MB
EGAF00005574671 txt.bz2 15.5 MB
EGAF00005574672 txt.bz2 15.6 MB
EGAF00005574673 txt.gz 19.3 MB
EGAF00005574674 txt.gz 19.2 MB
EGAF00005574675 txt.gz 19.3 MB
EGAF00005574676 txt.gz 19.3 MB
EGAF00005574677 txt.bz2 15.4 MB
EGAF00005574678 txt.gz 19.3 MB
EGAF00005574679 txt.bz2 15.6 MB
EGAF00005574680 txt.bz2 15.6 MB
EGAF00005574681 txt.gz 19.5 MB
EGAF00005574682 txt.bz2 15.4 MB
EGAF00005574683 txt.bz2 15.6 MB
EGAF00005574684 txt.gz 19.3 MB
EGAF00005574685 txt.bz2 15.6 MB
EGAF00005574686 txt.bz2 15.6 MB
EGAF00005574687 txt.gz 19.4 MB
EGAF00005574688 txt.gz 19.4 MB
EGAF00005574689 txt.bz2 15.6 MB
EGAF00005574690 txt.bz2 15.5 MB
EGAF00005574691 txt.gz 19.3 MB
EGAF00005574692 txt.gz 19.3 MB
EGAF00005574693 txt.bz2 15.7 MB
EGAF00005574694 txt.gz 19.4 MB
EGAF00005574695 txt.gz 19.3 MB
EGAF00005574696 txt.gz 19.3 MB
EGAF00005574697 txt.gz 19.4 MB
EGAF00005574698 txt.bz2 15.7 MB
EGAF00005574699 txt.bz2 15.7 MB
EGAF00005574700 txt.bz2 15.7 MB
EGAF00005574701 txt.gz 19.6 MB
EGAF00005574702 txt.bz2 15.6 MB
EGAF00005574703 txt.bz2 15.5 MB
EGAF00005574704 txt.bz2 15.5 MB
EGAF00005574705 txt.bz2 15.6 MB
EGAF00005574706 txt.gz 19.2 MB
EGAF00005574707 txt.bz2 15.7 MB
EGAF00005574708 txt.bz2 15.6 MB
EGAF00005574709 txt.gz 19.3 MB
EGAF00005574710 txt.gz 19.3 MB
EGAF00005574711 txt.gz 19.3 MB
EGAF00005574712 txt.bz2 15.6 MB
EGAF00005574713 txt.bz2 15.6 MB
EGAF00005574714 txt.bz2 15.5 MB
EGAF00005574715 txt.gz 19.4 MB
EGAF00005574716 txt.bz2 15.6 MB
EGAF00005574717 txt.bz2 15.5 MB
EGAF00005574718 txt.bz2 15.6 MB
EGAF00005574719 txt.gz 19.3 MB
EGAF00005574720 txt.gz 19.5 MB
EGAF00005574721 txt.bz2 15.5 MB
EGAF00005574722 txt.bz2 15.6 MB
56 Files (967.2 MB)