Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 7 Next »

Things like

  • Identify/recommend secure IU solutions for your use case.
  • Facilitate custom solutions for your use case.
  • Comply with cybersecurity rules, regulations, and IU policies.
  • Help with/review data security plans you are developing yourself.
  • Interpret cybersecurity requirements in grants, contracts, data use agreements.
  • Tell you if IU can support specific cybersecurity requirements.
  • Put you in touch with the right people on campus.
  • Communicate your needs to authorities engaged in security and data governance.

... in other words, anything where cybersecurity/compliance stands in the way of research.


We want your feedback

Please email securemyresearch@iu.edu to report errors/omissions and send critiques, suggestions for improvements, new use cases/recipes, or any other positive or negative feedback you might have.  It will be your contribution to the Cookbook and appreciated by all who use it.

  • No labels