Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Things like

  • Identify/recommend secure IU solutions for your use case.
  • Facilitate custom solutions for your use case.
  • Comply with cybersecurity rules, regulations, and IU policies.
  • Help with/review data security plans you are developing yourself.
  • Interpret cybersecurity requirements in grants, contracts, data use agreements.
  • Tell you if IU can support specific cybersecurity requirements.
  • Put you in touch with the right people on campus.
  • Communicate your needs to authorities engaged in security and data governance.

... in other words, anything where cybersecurity/compliance stands in the way of research.




Info
titleWe want your feedback

Please email securemyresearch@iu.edu to report errors/omissions and send critiques, suggestions for improvements, new use cases/recipes, or any other positive or negative feedback you might have.  It will be your contribution to the Cookbook and appreciated by all who use it.




Live Search
spaceKeySMR
sizelarge
additionalnone
placeholderSearch for a recipe
typepage
labelsrecipe

Filter by label (Content by label)
showLabelsfalse
max5
spacesTRUSTEDRI
showSpacefalse
sortmodified
reversetrue
typepage
cqllabel in ("dua","security","dmp","terms","grant","contract","faq") and type = "page" and space = "SMR"
labelsgrant contract dua dmp terms security

Include Page
SMR Google Analytics
SMR Google Analytics