. . . "Researchers will design security features that control access to data in the central repository, as well as make the data readily available to participating state and federal agencies or other authorized organizations for reports and analysis." .