A Research Security Plan is required when:
- Your project involves highly sensitive data and/or
- You must comply with Data Use Agreements, grant/contract requirements, or applicable laws/regulations.
This internal document ensures your research team follows best practices for data security. Please email research-computing@uiowa.edu if you need assistance. Instructions are below:
- Download the Research IT Security Plan.
- Identify your Technical Lead:
- Contact your local IT support administrator to assist with completing the plan.
- If you don’t know who that is, email research-computing@uiowa.edu for help.
- Describe the data:
- List all data elements your project will collect.
- Determine the data classification (e.g., public, restricted, critical).
- List all systems and services involved:
- Include storage locations, collaboration tools, devices (university-owned or personal), analysis software, and any third-party or cloud services.
- Include storage locations, collaboration tools, devices (university-owned or personal), analysis software, and any third-party or cloud services.
- Technical Lead submits plan for review:
- Upload the document using this Workflow form: https://workflow.uiowa.edu/entry/new/21693
Important Notes:
- The Principal Investigator (PI) and the Technical Lead must be different people.
- The Technical Lead should hold an IT job classification.