Identify/recommend existing, secure IU solutions for your use case.
Facilitate custom, secure solutions for your use case.
Comply with cybersecurity rules, regulations, and
...
IU policies.
...
Help with/review data security
...
plans you are
...
developing yourself.
Provide you with boilerplates to include in your grants, contracts, of DUAs.
Interpret cybersecurity requirements in grants, contracts, data use agreements.
Tell you if IU has resources/systems that can support specific cybersecurity requirements.
Put you in touch with the right people on campus.
Communicate your needs to
...
authorities engaged in security and data governance.
...
... in other words, with anything and everything cybersecurity/compliance that stands in the way of research.
Info
title
We want your feedback
Please email securemyresearch@iu.edu to report errors/omissions and send critiques, suggestions for improvements, new use cases/recipes, or any other positive or negative feedback you might have. It will be your contribution to the Cookbook and appreciated by all who use it.
Live Search
spaceKey
SMR
size
large
additional
none
placeholder
Search for a recipe
type
page
labels
recipe
Related articles
Filter by label (Content by label)
showLabels
false
max
5
spaces
TRUSTEDRI
showSpace
false
sort
modified
reverse
true
type
page
cql
label in ("dua","security","dmp","terms","grant","contract","faq") and type = "page" and space = "SMR"