Need Help?

Transcriptome analysis of Tcells from blood, fat and skin

Tcells were isolated fom Tissues and FACS sorted. In total 50 samples were processed in 5 replicates with the Takara SmartSeq Stranded kit. Single end fastq-files are supplied.

Request Access

RCI DAC for Regulatory Tcell Study by M Delacher and M Feuerer

DATA ACCESS AGREEMENT Between : RCI Regensburg Center for Interventional Immunology, represented by the Director Prof. Dr. Philipp Beckhove, Project Leader: Prof. Dr. Markus Feuerer, RCI c/o University Hospital Regensburg, Franz-Josef-Strauß-Allee 11, D-93053 Regensburg, Germany -Data Producers/RCI Regensburg Center for Interventional Immunology- and (...) -User Institution- These terms and conditions govern access to the managed access datasets (details of which are set out in Appendix I) to which the User Institution has requested access. The User Institution agrees to be bound by these terms and conditions. Definitions Authorised Personnel: The individuals at the User Institution to whom the RCI Regensburg Center for Interventional Immunology grants access to the Data. This includes the User, the individuals listed in Appendix II and any other individuals for whom the User Institution subsequently requests access to the Data. Details of the initial Authorised Personnel are set out in Appendix II. Data: The managed access datasets to which the User Institution has requested access. Data Producers: RCI Regensburg Center for Interventional Immunology (further referred to as RCI) and the collaborators listed in Appendix I responsible for the development, organisation, and oversight of these Data. External Collaborator: A collaborator of the User, working for an institution other than the User Institution. Project: The project for which the User Institution has requested access to these Data. A description of the Project is set out in Appendix II. Publications: Includes, without limitation, articles published in print journals, electronic journals, reviews, books, posters and other written and verbal presentations of research. Research Participant: An individual whose data form part of these Data. Research Purposes: Shall mean research that is seeking to advance the understanding of genetics and genomics, including the treatment of disorders, and work on statistical methods that may be applied to such research. User: The principal investigator for the Project. User Institution(s): The Institution that has requested access to the Data. Data Producers Details: RCI Regensburg Center for Interventional Immunology c/o University Hospital Regensburg Franz-Josef-Strauß-Allee 11 D-93053 Regensburg Germany Phone: +49 941 944-38100 Fax: +49 941 944-38103 Email: info(at)rcii.de RCI NextGenerationSequencing-Core (NGS-Core) Phone: +49 941 944-18188 email: genomics-core@rcii.de 1. The User Institution agrees to comply with all applicable regulations, especially the General Data Protection Regulation (GDPR), to only use these Data for the purpose of the Project (described in Appendix II) and only for Research Purposes. The User Institution further agrees that it will only use these Data for Research Purposes which are within the limitations (if any) set out in Appendix I. 2. The User Institution agrees to preserve, at all times, the confidentiality of these Data. In particular, it undertakes not to use, or attempt to use these Data to compromise or otherwise infringe the confidentiality of information on Research Participants. Without prejudice to the generality of the foregoing, the User Institution agrees to use at least the measures set out in Appendix I to protect these Data. 3. The User Institution agrees to protect the confidentiality of Research Participants in any research papers or publications that they prepare by taking all reasonable care to limit the possibility of identification. 4. The User Institution agrees not to link or combine these Data to other information or archived data available in a way that could re-identify the Research Participants, even if access to that data has been formally granted to the User Institution or is freely available without restriction. 5. The User Institution agrees only to transfer or disclose these Data, in whole or part, or any material derived from these Data, to the Authorised Personnel. Should the User Institution wish to share these Data with an External Collaborator, the External Collaborator must complete a separate application for access to these Data. 6. The User Institution agrees that the Data Producers, and all other parties involved in the creation, funding or protection of these Data: a) make no warranty or representation, express or implied as to the accuracy, quality or comprehensiveness of these Data; b) exclude to the fullest extent permitted by law all liability for actions, claims, proceedings, demands, losses (including but not limited to loss of profit), costs, awards damages and payments made by the Recipient that may arise (whether directly or indirectly) in any way whatsoever from the Recipient’s use of these Data or from the unavailability of, or break in access to, these Data for whatever reason and; c) bear no responsibility for the further analysis or interpretation of these Data. 7. The User Institution agrees to follow the Fort Lauderdale Guidelines (https://icgc.org/files/daco/WT_SharingData_FTLauderdale_2003_en.pdf) and the Toronto Statement (http://www.nature.com/nature/journal/v461/n7261/full/461168a.html). This includes but is not limited to recognising the contribution of the Data Producers and including a proper acknowledgement in all reports or publications resulting from the use of these Data. 8. The User Institution agrees to follow the Publication Policy in Appendix III. This includes respecting the moratorium period for the Data Producers to publish the first peer-reviewed report describing and analysing these Data. 9. The User Institution agrees not to make intellectual property claims on these Data and not to use intellectual property protection in ways that would prevent or block access to, or use of, any element of these Data, or conclusion drawn directly from these Data. 10. The User Institution can elect to perform further research that would add intellectual and resource capital to these data and decide to obtain intellectual property rights on these downstream discoveries. In this case, the User Institution agrees to implement licensing policies that will not obstruct further research and to follow the OECD’s (Organisation for Economic Co-operation and Development) Guidelines for the Licensing of the Genetic Inventions (2006) (https://icgc.org/files/daco/OECD_GeneticInventions_2006_en.pdf). 11. The User Institution agrees to destroy/discard the Data held, once it is no longer used for the Project, unless obliged to retain the data for archival purposes in conformity with audit or legal requirements. 12. The User Institution will notify the RCI within 30 days of any changes or departures of Authorised Personnel. 13. The User Institution will notify the RCI prior to any significant changes to the protocol for the Project. 14. The User Institution will notify the RCI as soon as it becomes aware of a breach of the terms or conditions of this agreement. 15. The RCI may terminate this agreement by written notice to the User Institution. If this agreement terminates for any reason, the User Institution will be required to destroy any Data held, including copies and backup copies. This clause does not prevent the User Institution from retaining these data for archival purpose in conformity with audit or legal requirements. 16. The User Institution accepts that it may be necessary for the Data Producers to alter the terms of this agreement from time to time. As an example, this may include specific provisions relating to the Data required by Data Producers other than RCI. In the event that changes are required, the Data Producers or their appointed agent will contact the User Institution to inform it of the changes and the User Institution may elect to accept the changes or terminate the agreement. 17. If requested, the User Institution will allow data security and management documentation to be inspected to verify that it is complying with the terms of this agreement. 18. The User Institution agrees to distribute a copy of these terms to the Authorised Personnel. The User Institution will procure that the Authorised Personnel comply with the terms of this agreement. 19. This agreement (and any dispute, controversy, proceedings or claim of whatever nature arising out of this agreement or its formation) shall be construed, interpreted and governed by the laws of Germany and shall be subject to the exclusive jurisdiction of the courts of Regensburg, Germany. Agreed for User Institution Signature: Name: Title: Date: Principal Investigator I confirm that I have read and understood this Agreement. Signature: Name: Title: Date: Agreed for the Data Producers / RCI: Signature: Name: Prof. Dr. Philipp Beckhove Title: Director of the RCI Date: Acknowledged and agreed: Signature: Name: Prof. Dr. Markus Feuerer Title: Project Leader Date: APPENDIX I – DATASET DETAILS APPENDIX II ––PROJECT DETAILS APPENDIX III –– PUBLICATION POLICY APPENDIX I – DATASET DETAILS (to be completed by the data producer before passing to applicant) Dataset reference (EGA Study ID and Dataset Details) Name of project that created the dataset Names of other data producers/collaborators Specific limitations on areas of research Health/Medical/Biomedical Research Use (DUO:0000006) Research Ethics Approval Required (DUO:0000021) Not-for-Profit Use Only (DUO:0000018) Legal basis for Data sharing: The User and User institution shall be responsible for the acquired personal data as defined in the General Data Protection Regulation (GDPR), consider especially Article 24 and 25 GDPR in particular in conjunction with Article 5 Paragraph 1, and Paragraph 2 GDPR. The measures to be taken are state of the art measures of data security and measures that guarantee a protection level appropriate to the risk concerning confidentiality, integrity, availability and resilience of the systems. The state of the art, implementation costs, the nature, scope and purposes of processing as well as the probability of occurrence and the severity of the risk to the rights and freedoms of natural persons within the meaning of Article 32 Paragraph 1 GDPR must be taken into account. The Technical and Organisational Measures are subject to technical progress and further development. In this respect, it is permissible for the Supplier to implement alternative adequate measures. In so doing, the security level of the defined measures must not be reduced. Substantial changes must be documented. For user institutions outside the EU in the absence of a decision pursuant to Article 45(3) GDPR standard data protection clauses adopted by the Commission in accordance with the examination procedure referred to in Article 93(2) GDPR should be concluded preferably. Minimum technical and organisational measures required: Measures suitable for preventing unauthorised persons from gaining access to data processing equipment with which personal data are processed or used. Access control measures for building and room security include automatic access control systems, the use of chip cards and transponders, access control by gatekeepers and alarm systems. Servers, telecommunications equipment, network technology and similar equipment must be protected in lockable server cabinets. In addition, access control should be supported by organisational measures (e.g. service instructions which provide for the locking of the offices during absence). Measures suitable to prevent data processing systems (computers) from being used by unauthorised persons. User identification with password for operating systems and software products used, screen saver with password. Up-to-date Anti-Virus-Software and firewalls on client computers and servers. Server hardening, intrusion detection systems and encryption of data media or data files. Use of VPN for remote accesses. Ssh-based client-server communication. Central management of user rights and permissions. File access: Data can be held in unencrypted files on an institutional compute system, with Unix user group read/write access for one or more appropriate groups but not Unix world read/write access behind a secure firewall, for a limited period of time (up to 3 month) for primary analysis. They can be again decrypted if primary analysis has to be repeated. The hard drives of Laptops holding these data must be encrypted. If held on USB keys or other portable hard drives, the data must be encrypted. Measures to ensure that those authorised to use a data processing system can only access the data subject to their access authorisation and that personal data cannot be read, copied, altered or removed without authorisation during processing, use and after storage. Access control can be ensured, among other things, by means of suitable user authorization concepts that enable differentiated control of access to data. In doing so, it is important to differentiate both the content of the data and the possible access functions to the data. Furthermore, suitable control mechanisms and responsibilities must be defined to document the granting and withdrawal of authorizations and to keep them up to date (e.g. upon hiring, change of job, termination of employment). Special attention should always be paid to the role and possibilities of administrators. Logging of user and administrator access and retrieval of the data should be supported. Further measures should include data protection management by an internal / external data protection officer and incident response management should be in place to prevent the uncontrolled distribution of data during the period when data has to be store unencrypted for analysis. APPENDIX II – PROJECT DETAILS (to be completed by the Requestor) Details of dataset requested i.e., EGA Study and Dataset Accession Number Brief abstract of the Project in which the Data will be used (500 words max) All Individuals who the User Institution to be named as registered users Name of Registered User Email Job Title Supervisor* All Individuals that should have an account created at the EGA Name of Registered User Email Job Title APPENDIX III – PUBLICATION POLICY The RCI intends to publish the results of their analysis of this dataset and do not consider its deposition into public databases to be the equivalent of such publications. The RCI anticipate that the dataset could be useful to other qualified researchers for a variety of purposes. However, some areas of work are subject to a publication moratorium. The publication moratorium covers any publications (including oral communications) that describe the use of the dataset. For research papers, submission for publication should not occur until 24 months after these data were first made available on the relevant hosting database, unless the RCI has provided written consent to earlier submission. In any publications based on these data, please describe how the data can be accessed, including the name of the hosting database (e.g., The European Genome-phenome Archive at the European Bioinformatics Institute) and its accession numbers (e.g., EGAS00000000029), and acknowledge its use in a form agreed by the User Institution with the Data Producers/RCI.

Studies are experimental investigations of a particular phenomenon, e.g., case-control studies on a particular trait or cancer research projects reporting matching cancer normal genomes from patients.

Study ID Study Title Study Type
Other

This table displays only public information pertaining to the files in the dataset. If you wish to access this dataset, please submit a request. If you already have access to these data files, please consult the download documentation.

ID File Type Size Located in
EGAF00005282926 1620589505722 517.3 MB
EGAF00005282927 1620589505722 475.1 MB
EGAF00005282928 1620589505722 412.6 MB
EGAF00005282929 1620589505722 378.5 MB
EGAF00005282930 1620589505722 381.3 MB
EGAF00005282931 1620589505722 349.7 MB
EGAF00005282932 1620589505722 457.5 MB
EGAF00005282933 1620589505722 419.1 MB
EGAF00005282934 1620589505722 476.1 MB
EGAF00005282935 1620589505722 436.6 MB
EGAF00005282936 1620589505722 547.9 MB
EGAF00005282937 1620589505722 502.3 MB
EGAF00005282938 1620589505722 533.4 MB
EGAF00005282939 1620589505722 488.8 MB
EGAF00005282940 1620589505722 443.0 MB
EGAF00005282941 1620589505722 405.8 MB
EGAF00005282942 1620589505722 471.9 MB
EGAF00005282943 1620589505722 432.0 MB
EGAF00005282944 1620589505722 502.1 MB
EGAF00005282945 1620589505722 460.3 MB
EGAF00005282946 1620589505722 415.0 MB
EGAF00005282947 1620589505722 381.4 MB
EGAF00005282948 1620589505722 483.3 MB
EGAF00005282949 1620589505722 442.1 MB
EGAF00005282950 1620589505722 488.9 MB
EGAF00005282951 1620589505722 446.9 MB
EGAF00005282952 1620589505722 431.1 MB
EGAF00005282953 1620589505722 393.9 MB
EGAF00005282954 1620589505722 433.5 MB
EGAF00005282955 1620589505722 396.6 MB
EGAF00005282956 1620589505722 440.1 MB
EGAF00005282957 1620589505722 404.4 MB
EGAF00005282958 1620589505722 440.1 MB
EGAF00005282959 1620589505722 403.0 MB
EGAF00005282960 1620589505722 350.3 MB
EGAF00005282961 1620589505722 320.2 MB
EGAF00005282962 1620589505722 480.5 MB
EGAF00005282963 1620589505722 439.6 MB
EGAF00005282964 1620589505722 516.9 MB
EGAF00005282965 1620589505722 473.0 MB
EGAF00005282966 1620589505722 280.2 MB
EGAF00005282967 1620589505722 258.3 MB
EGAF00005282968 1620589505722 472.5 MB
EGAF00005282969 1620589505722 434.3 MB
EGAF00005282970 1620589505722 414.0 MB
EGAF00005282971 1620589505722 379.6 MB
EGAF00005282972 1620589505722 296.4 MB
EGAF00005282973 1620589505722 273.1 MB
EGAF00005282974 1620589505722 455.7 MB
EGAF00005282975 1620589505722 418.6 MB
EGAF00005282976 1620589505722 437.9 MB
EGAF00005282977 1620589505722 402.1 MB
EGAF00005282978 1620589564616 502.3 MB
EGAF00005282979 1620589564616 460.5 MB
EGAF00005282980 1620589564616 441.2 MB
EGAF00005282981 1620589564616 403.9 MB
EGAF00005282982 1620589564616 486.5 MB
EGAF00005282983 1620589564616 445.1 MB
EGAF00005282984 1620589564616 512.4 MB
EGAF00005282985 1620589564616 469.7 MB
EGAF00005282986 1620589564616 78.9 MB
EGAF00005282987 1620589564616 72.7 MB
EGAF00005282988 1620589564616 181.9 MB
EGAF00005282989 1620589564616 167.6 MB
EGAF00005282990 1620589564616 511.7 MB
EGAF00005282991 1620589564616 468.2 MB
EGAF00005282992 1620589564616 416.7 MB
EGAF00005282993 1620589564616 382.4 MB
EGAF00005282994 1620589564616 542.1 MB
EGAF00005282995 1620589564616 495.8 MB
EGAF00005282996 1620589564616 498.3 MB
EGAF00005282997 1620589564616 454.9 MB
EGAF00005282998 1620589564616 434.7 MB
EGAF00005282999 1620589564616 397.3 MB
EGAF00005283000 1620589564616 470.2 MB
EGAF00005283001 1620589564616 429.8 MB
EGAF00005283002 1620589564616 488.7 MB
EGAF00005283003 1620589564616 446.1 MB
EGAF00005283004 1620589564616 471.0 MB
EGAF00005283005 1620589564616 431.3 MB
EGAF00005283006 1620589564616 542.3 MB
EGAF00005283008 1620589564616 497.5 MB
EGAF00005283009 1620589564616 417.4 MB
EGAF00005283010 1620589564616 383.5 MB
EGAF00005283011 1620589564616 388.5 MB
EGAF00005283013 1620589564616 356.1 MB
EGAF00005283014 1620589564616 460.2 MB
EGAF00005283015 1620589564616 422.1 MB
EGAF00005283016 1620589564616 460.1 MB
EGAF00005283017 1620589564616 422.7 MB
EGAF00005283018 1620589564616 539.5 MB
EGAF00005283019 1620589564616 495.3 MB
EGAF00005283020 1620589564616 292.1 MB
EGAF00005283021 1620589564616 268.0 MB
EGAF00005283022 1620589564616 390.0 MB
EGAF00005283023 1620589564616 358.0 MB
EGAF00005283024 1620589564616 331.6 MB
EGAF00005283025 1620589564616 304.8 MB
EGAF00005283026 1620589564616 446.9 MB
EGAF00005283027 1620589564616 411.4 MB
100 Files (41.9 GB)