Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »

Things like

  • Identify/recommend secure IU solutions for your use case.
  • Facilitate custom solutions for your use case.
  • Comply with cybersecurity rules, regulations, and IU policies.
  • Help with/review data security plans you are developing yourself.
  • Interpret cybersecurity requirements in grants, contracts, data use agreements.
  • Tell you if IU can support specific cybersecurity requirements.
  • Put you in touch with the right people on campus.
  • Communicate your needs to authorities engaged in security and data governance.

... in other words, anything where cybersecurity/compliance stands in the way of research.


Search for a recipe:


Navigation Tip

To go back to the home page, you can click the small IU icon at the top of the sidebar or use breadcrumbs above the title.

  • No labels