Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

  • Identify existing solutions for your use case.
  • Comply with cybersecurity rules and regulations.
  • Bake data security in when you are designing your study.
  • InterpretĀ  cybersecurity requirements in grants, contracts, data use agreements.
  • Communicate your needs to offices engaged in governance.
  • Put you in touch with the right technology people.
  • Partner with you on cybersecurity projects.
  • No labels