Conduct a research study using subject-owned device

In some cases, researchers may request that study participants install software on their personal devices. Since these devices are not institutionally owned, this poses an additional risk as the security of these devices is not ensured by the policies and controls in place at IU. While we may not be able to require certain security measures be in place on non-IU owned devices, we can at least provide research participants with some guidelines and best practices during the onboarding process to help minimize risk of a sensitive data breach.

Prerequisites

  1. If you intend to use a software package or tool that is not already licensed or provided by IU, complete the Software & Services Selection Process (SSSP) form. Purchasing will not approve until this process is complete. If you need help completing this form, consult with your local IT Pro.

Directions

  1. For mobile devices including laptops, tablets, and smart phones, provide participants with the information in this KB document.
  2. Also provide participants with the information in this KB document which is relevant to both desktop computers and laptops, and also contains general security recommendations.


Email securemyresearch@iu.edu if you would like us to help you ensure a secure workflow for gathering data from study participant's devices.


Approved for

We want your feedback

Please email securemyresearch@iu.edu to report errors/omissions and send critiques, suggestions for improvements, new use cases/recipes, or any other positive or negative feedback you might have.  It will be your contribution to the Cookbook and appreciated by all who use it.