Restricted file store for terrorism and extremism research

Store research relating to terrorism or extremism in this secure space to adhere to UK anti-terrorism legislation.

If your research relates to terrorism or extremism, save your materials and data in this secure space to ensure you meet the legal requirements of UK anti-terrorism legislation.

Restricted file store for terrorism and extremism research

This restricted file store is provided for researchers who are accessing materials related to terrorism or extremism. It means you and the University meet the requirements of Counter Terrorism and Security Act 2015, commonly known as the Prevent duty.

To get a space in the store contact your School research ethics officer who can make the request for you. Within a week the space will be available with access arranged for the nominated researchers. You’ll also get information about how to access the space and use it.

Access will be automatically removed from any researcher who leaves the University.

More about Restricted file store

Free or paid for:

Free

Product Features

  • Restricted file store
  • Access by nominated researchers only
  • Meets requirements of UK anti-terrorism law
  • Access rights removed when a researcher leaves the University

Applicable Disciplines

  • Agricultural and Biological Sciences
  • Business, Management and Accounting
  • Computer Sciences
  • Energy
  • Health Professions
  • Material Science
  • Neuroscience
  • Physics and Astronomy
  • Arts and Humanities
  • Chemical Engineering
  • Earth and Planetary Sciences
  • Engineering
  • Immunology and Microbiology
  • Mathematics
  • Nursing
  • Psychology
  • Biochemistry, Genetics and Molecular Biology
  • Chemistry
  • Economics, Econometrics and Finance
  • Environmental Science
  • Medicine
  • Pharmacology, Toxicology and Pharmaceutics
  • Social Sciences
  • Veterinary

Terms & Conditions

Specific to this tool:

  • The University's responsibilities under the Counter-Terrorism and Security Act (2015), commonly known as the Prevent duty.

General:

  • The Computing Regulations govern the use of all University computing and network facilities by staff, students and anyone else authorised to use them
  • The Information Security Policy provides a framework for the security information assets and technology

Technical Requirements

  • EASE Login
  • Access request made by School ethics officer

Support and Training Available

  • Contact IS helpline for support and training