Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Identify/recommend secure IU solutions for your use case.
  • Build/facilitate Facilitate custom solutions for your use case.
  • Comply with cybersecurity rules and , regulations, and IU policies.
  • Review Help with/review data security plans you are developing yourself.
  • InterpretĀ  Interpret cybersecurity requirements in grants, contracts, data use agreements.
  • Tell you if IU can support specific cybersecurity requirements.
  • Put you in touch with the right people .Partner with you on cybersecurity projectson campus.
  • Communicate your needs to authorities engaged in security and data governance.

... in other words, anything where cybersecurity/compliance stands in the way of research.


Search for a recipe:

Live Search
spaceKeySMR
sizelarge
additionalnone
typepage
labelsrecipe


Info
titleNavigation Tip

To go back to the home page, you can click the small IU icon at the top of the sidebar or use breadcrumbs above the title.

...