# Other methods ## Physically bring in a disk Alternatively, you provide your data on a physical disk/USB stick. - Please **encrypt** your data before putting it onto the storage device. - Deliver/courier the device to the hosting institution. - Send the {ref}`role_tresa` a secure email with the encryption key. ```{caution} Please ensure that you use a modern encryption algorithm and a strong key to secure your data. ``` ## Download via a secure computer Using a secure out-of-band communication method (such as a secure email or messaging service), the data provider sends the {ref}`role_tresa` a URL where the data can be downloaded. This is a URL which is incompatible with `AzCopy` for some reason. In this case, the {ref}`role_tresa` will download the data to a secure local computer and reupload it to the storage account. - such machines are freshly imaged before each transfer - they use the standard Turing build process with Sophos anti-virus, Qualys vulnerability management and BitLocker full disk encryption - the machines are securely wiped using standard tools such as Dell Data Wipe or Intune Data Wipe.