The CICB SHED provides secure storage of clinical data for research studies
The Safely Held Electronic Data – SHED – system is a standardized and integrated database platform that provides unified management of data from multiple sources. The SHED is designed around complementary systems that are enhanced with custom software tools.
- Oncore®: This database system, based in Oracle, provides the auditability and process visibility essential to the management of clinical trials and human subjects cancer research. Oncore® has particularly strong applications for safely managing personally identifiable information and tracking these data over multiple distinct interactions, which may include longitudinal visits or laboratory data being captured at different times.
- Labmatrix™: This database system supports the management of laboratory and other research-derived data. Labmatrix™ has multiple system-level interface options to facilitate the exchange of all appropriate patient and biospecimen data. Qiagram is a graphical user interface that can query and integrate data across Oncore® and Labmatrix™. Qiagram allows a user to develop and execute queries across all the data elements, easily integrating across clinical, neuropathological, demographic, biomarker, imaging, and genomic data.
- Oracle Application Express (APEX) is a framework for designing custom interactive applications tailored to the specific needs of a project.
These three offerings address a wide range of logistic support and data management tasks.
The SHED provides study management that is
ICB SHED services are in use across Cleveland
Learn how to Use SHED Features from ICB Technologists
Our technology experts have created video tutorials for a variety of SHED tools and resources. See these videos below, or browse our Labmatrix, OnCore, and APEX video pages.
The SHED is a housed within a Secure Research Environment (SRE) developed and managed by Case Western Reserve’s University Technology (Utech). The SRE uses standardized operating procedures, rigid access control, auditing and encryption procedures to minimize risk to study data.