Security-minded IT leaders at research institutions already oversee a high volume of research compliance projects related to data security. Leaders can expect more requests as grant awards increasingly contain moreexplicit security and compliance language regarding storage, access, and reporting. But as the number of requests expand, resources are not. CISOs are caught between a desire to elevate researcher awareness of information security risksand the IT security team’s capacity to provide services to rectify these risks. To overcome barriers to securing research data, IT leaders need to proceduralize research compliance—and increase awareness among researchers of self-service security tools. Read this executive brief to discover ways that progressive higher education organizations are proceduralizing research compliance among their faculty. Download the Executive Brief Surfacing Research Data at Risk Online Risk DiagnosticInteractive Questions Pinpoint Applicable Data Restrictions PIs can self-identify the level of risk related to their research data by accessing anonline tool that takes them through nine questions pinpointing the data restrictionsthat apply to projects. If necessary, the Diagnostic will prompt the PI to contact theinformation security team for consultation. Download the practice. Streamlining Access to Existing Solutions Research Security Solutions ToolboxEnabling Researchers to More Easily Find Security Solutions To reduce security staff and PI effort to complete grant proposals, institutions arelinking results of security needs diagnostics to a catalog of common, pre-approvedsecurity solutions related to different risks. These catalogs may even include languagePIs can use in their grant proposals to articulate the steps they will take to protecttheir data. Extending…
This report profiles the ways that progressive institutions are encouraging researchers to self-identify and mitigate the risks to their research data, as well as strategies to identify emerging research compliance risks.
This resource requires EAB partnership access to view.
Access the research report
Learn how you can get access to this resource as well as hands-on support from our experts through IT Strategy Advisory Services.
Learn More