Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
  • Identify existing secure IU solutions for your use case.
  • Build/facilitate custom solutions for your use case.
  • Comply with cybersecurity rules and regulations and IU policies.
  • Bake Review data security in when you are designing your studyyou have designed yourself.
  • InterpretĀ  cybersecurity requirements in grants, contracts, data use agreements.
  • Communicate your needs to offices engaged in governance.
  • Put you in touch with the right technology people.
  • Partner with you on cybersecurity projects.
  • Communicate your needs to offices engaged in data governance.
  • Anything where cybersecurity/compliance stands in the way of research.