A Research Security Plan is required when:

  • Your project involves highly sensitive data and/or
  • You must comply with Data Use Agreements, grant/contract requirements, or applicable laws/regulations.

This internal document ensures your research team follows best practices for data security. Please email research-computing@uiowa.edu if you need assistance. Instructions are below:

  1. Download the Research IT Security Plan.
     
  2. Identify your Technical Lead:
    • Contact your local IT support administrator to assist with completing the plan.
    • If you don’t know who that is, email research-computing@uiowa.edu for help.
       
  3. Describe the data:
    • List all data elements your project will collect.
    • Determine the data classification (e.g., public, restricted, critical).
       
  4. List all systems and services involved:
    • Include storage locations, collaboration tools, devices (university-owned or personal), analysis software, and any third-party or cloud services.
       
  5. Technical Lead submits plan for review:

 

Important Notes:

  • The Principal Investigator (PI) and the Technical Lead must be different people.
  • The Technical Lead should hold an IT job classification.
Last updated
Article number
6251