A Research IT Security Plan is often required to ensure compliance with Data Use Agreements, contract/grant requirements, and/or because your project is dealing with highly sensitive data. The Research IT Security Plan is an internal document that is used to make sure research teams are following best practices when it comes to data security. As a general recommendation, please be as detailed as possible when filling out the document. Please email research-computing@uiowa.edu if you need assistance. Instructions are below:

  1. Download a copy of the document.
  2. Contact your local IT support admin to serve as the Technical Lead and for assistance in filling out the document. If unknown, contact research-computing@uiowa.edu to determine who your local IT support admin is.
  3. List out all data points collected and determine data classification.​
  4. List out all services your data will touch – storage locations, collaboration tools, university-owned or personal computer/laptop, analysis software, third-party tools or cloud services, etc.​
  5. Email completed Research IT Security Plan to research-computing@uiowa.edu for review.​

*Please note*, the Principal Investigator and the Technical Lead should not be the same person.​ The Technical Lead should be someone working under an IT job classification.


Article number: 
Last updated: 
December 19, 2023