-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Protecting the Security of Research Data
Tuesday, November 8, 2011
Abstract
The effective protection and management of research data has become a hot topic in U.S. higher education. Funding agencies increasingly require data management plans as part of grant submittals, and research offices are being asked to certify the security of research data generated by grant activity. Heretofore, the context for data management and information security activities and initiatives in higher education largely focused on the “enterprise” (administrative) data of the institution, not those data generated by research activities. IT professionals need to be aware that many academic research endeavors include the collection, analysis, and/or storage of sensitive data, the integrity, confidentiality, and availability of which must be asserted and demonstrated. In many cases, the security of sensitive information gathered in the conduct of research is required by law. This research bulletin discusses an over-arching approach by which campus IT solutions can be architected and deployed in such a way as to provide adequate management of research data assets without hindering the research process.
Citation for this Work: Conrad, Larry D., Ruth Marinshaw, and Stan Waddell. “Protecting the Security of Research Data.” (Research Bulletin). Boulder, CO: EDUCAUSE Center for Analysis and Research, November 8, 2011, available from http://www.educause.edu/ecar.



















