Accessing and Exploring FITBIR Data: A Step-by-Step Guide

Accounts Icon
Accounts

1

Confirm Account Access

All data accessors must have an account to log in to FITBIR. A Data Access Request Form must be completed and submitted for review to the Data Access Committee. Please see Get An Account for details.

Data Repository Icon
Data Repository

2

View Data By Study

The Data Repository houses the data in FITBIR by study. You can view details of each study that has submitted or will submit to FITBIR. If the data is shared or if you have access to the data, you can download the data from each study exactly as it was uploaded.

Query Tool Icon
Query Tool

3

Filter And Download Data

The Query Tool pulls from the Data Repository and allows you to manipulate and filter the data based on your research question of interest. You may choose to download your data after applying your filters.

Meta Study Icon
Meta Study

4

Create Meta Analysis

Meta Study allows a researcher to create a secondary study using data pulled from the Data Repository. A researcher can save the filters they created in the Query Tool and save a copy of the data they manipulated in the Query Tool.

Sorry, your browser does not support inline SVG.

DATA ACCESS CRITERIA

The following criteria must be met in order to obtain access to FITBIR data:

  • Projects must be specified for research purposes only (not commercial) with the intention to enhance knowledge for the benefit of human health.
  • Individuals requesting access must:
    • Be a permanent employee of their institution at a level equivalent to, but not limited to, a tenure-track professor or senior researcher; Data Access Requesters cannot be post-doctoral fellows, trainees, or lab technicians.
    • Have oversight responsibility for others named on the data access request who will be granted access to the data.
    • Can be accountable for ensuring that all aspects of data usage align with the terms of the DUA and institutional policy.
    • Have an institutional email (no public emails will be accepted, e.g., Gmail).
  • All data access requests must be signed by an individual legally authorized to sign on behalf of the institution/business/organization.

Access my be denied or revoked if:

  • The data access request form is incomplete.
  • The individual or affiliation cannot be confirmed.
  • The key personnel/collaborators are not from the same institution/business/organization.
  • The request comes from a country or organization that is considered hostile or a security threat.
  • There is reason to believe that the requester is not, or will not be, adhering to the policy document.