- Identify existing secure IU solutions for your use case.
- Build/facilitate custom solutions for your use case.
- Comply with cybersecurity rules and regulations and IU policies.
- Bake Review data security in when you are designing your studyyou have designed yourself.
- InterpretĀ cybersecurity requirements in grants, contracts, data use agreements.
- Communicate your needs to offices engaged in governance.
- Put you in touch with the right technology people.
- Partner with you on cybersecurity projects.
- Communicate your needs to offices engaged in data governance.
- Anything where cybersecurity/compliance stands in the way of research.
Page Comparison
Manage space
Manage content
Integrations