Investigators may now request permission to use cloud computing services when submitting a dbGaP Project Request or Renewal application. Investigators must identify the cloud service provider or providers that will be employed and describe how the cloud computing service will be used to carry out their proposed research.

dbGaP Authorized Access

Log In

to the Authorized Access system

dbGaP Authorized Access is the management portal for individual-level data.
This site can be used to submit a data access request, manage access requests, and download approved data sets.

How does one apply?

Click on the “log in” link (upper right side of this page) and follow the instructions. In order to log in and apply for authorized access to dbGaP studies you must have one of the following accounts:

For additional information, see request procedures for principal investigators and signing officials.

Who can apply?

Researchers from outside of NIH need to be identified as principal investigators (PIs) in the eRA Commons system. If you are not a PI, when you log in, the system will advise you to contact your local supervisor to apply on your behalf.

NIH intramural employees can apply if they are registered in the NIH Intramural Database (NIDB) as a PI, PI-eligible, or Lead Investigator. NIH administrative and extramural staff can apply if they meet specified criteria. When NIH employees log in, the system will recognize their status and direct them to obtain any necessary approvals and fill out any required forms. For further information, see NIH February 6, 2008, memo on Requesting Access to Data in the NIH GDS Data Repository.

The Code of Conduct is an agreement that research investigators agree to abide by as Approved Users of data received through the database for Genotypes and Phenotypes (dbGaP). Failure to abide by any term within this Code of Conduct may result in the revocation of approved access to any or all datasets obtained through dbGaP.

Why is access restricted?

NIH is committed to respecting the privacy and intentions of research participants with regard to how data pertaining to their individual information is used. Data access is therefore intended only for scientific investigators pursuing research questions that are consistent with the informed consent agreements provided by individual research participants. Furthermore, investigators provided access will be expected to utilize appropriate data security measures.

Who is an authorized user within the data access request system?

Authorized users include the researchers who may request data sets for specific research uses, the institutional signing officials from the PI's home organization who certify and submit such requests, and the NIH staff who review and process requests (e.g., members of the Data Access Committees).

Do you need further help?