Skip to main content

Legal Framework and Ethical Use of This Resource

The National Cancer Institute (NCI) and the University of Arkansas for Medical Sciences (UAMS) offers this image repository to encourage cross-disciplinary science. Some of this data may already be published or in public domain. In addition, confidential information may be posted which has not yet been published or is subject of patent applications yet to be filed. Data may also be subject to copyright and commercial use may be protected under United States and foreign copyright laws. Other parties may retain rights to publish or reproduce these documents. In addition, some data may be the subject of patent applications or issued patents, and you may need to seek a license for its commercial use. These exceptions are listed on our Data Usage Policies and Restrictions page. If you are a contributor submitting data to this image repository, you are certifying that you are the original source of this data and are authorized to release the data that is permitted by your local IRB, when relevant. You also certify that you will consult with your institution’s technology development office before posting or disclosing confidential information which may be patentable. You may browse, download, and use the data for commercial, scientific and educational purposes. However, you may encounter documents or portions of documents contributed by private institutions or organizations. NCI and UAMS do not warrant or assume any legal liability or responsibility for accuracy, completeness or usefulness of information in this archive. Every effort will have been made to remove private health information (PHI) from images both by the submitter and again by tested automatic de-identification processes by UAMS as required by HIPAA for data use agreements [45CFR164.514(e)(4)], i.e., appropriate safeguards to ensure that protected health information (PHI) is not used or disclosed inappropriately. Nonetheless ethical principles command all users to make no attempt to identify individuals from whatever data elements and metadata remain. By continuing with this registration process, you understand that all necessary information describing the use of the system is detailed in the online help documentation accessible from the left-menu bar from within the application.

User Registration Privacy Act Notification Statement

The Cancer Imaging Archive web portal requires users to register. The use of this information is to allow the NCI and UAMS to continuously improve the image repository as a public service. Collection of this information is authorized under Title IV of the PHS Act, Section 410[285]. This information may be disclosed to researchers for research purposes, and to other registered repository users for commercial, scientific and educational purposes. Submission of this information is voluntary. However, when registering please complete all fields. The Cancer Imaging Archive web portal also records IP addresses and aggregated user query information. However, the IP address is not associated with any user registration information. The user registration data, IP addresses and aggregated user query information are used for UAMS internal reporting purposes only to allow for improvement of the web portal based on users needs. For additional information, please refer to the Legal Rules noted above, and the link to our Privacy Policy. We do not give, share, sell or transfer any personal information to a third party. When inquiries are e-mailed to us, we store the question and the e-mail address information so that we can respond electronically. Unless otherwise required by statute, we do not identify publicly who sends questions or comments to our web site. We will not obtain information that will allow us to personally identify you when you visit our site, unless you chose to provide such information to us. To assure the integrity of information on this server, we reserve the right to monitor system access if malicious actions are taken to disable our on-line services or intentionally gain unauthorized access to NCI systems.