Research Security Support
Many KU researchers engage in research that involves the collection or use of identifiable private information. Federal law and KU policy provide specific guidance for protecting identifiable research information.
The IT Research Support Team and KU Information Technology, in partnership with the Office of Research, offer specialized services to meet the needs of KU researchers, including security-related support, Research File Storage, access to the Advanced Computing Facility, and research websites.
The IT Research Support Team provides a single point of contact for KU researchers who need technology support in labs, research centers and on grant-funded projects.
Please contact IT Research Support Team at email@example.com or 785-864-7171 to discuss the information security requirements of your research and how we can best assist you. See KU IT Research Support Team to learn more about the team and services.
Research Security Basics
Data Classification and Handling Policy
Classification is necessary to understand which security practices should be used to protect different types of information. The more protected the information needs to be, the more practices are required. Please read and comply with the KU Data Classification and Handling Policy.
Sensitive Research Data
KU research may deal with sensitive information that does not directly relate personally identifiable information. Proprietary information subject to confidentiality requirements, information with national security implications and other types of information may require extra security precautions. Researchers are encouraged to consult with KU IT to determine the proper security measures needed for these types of data.
Breach Notification Requirements
Each research project should have a well-defined document detailing what to do in the case of a security breach. Obtaining, creating and retaining the breach notification requirements is the responsibility of the researcher.
Principal Investigator (PI) Responsibility
It is the responsibility of the Principal Investigator (PI) to comply with information security. Each PI is encouraged to carefully examine their use agreements, grants and other contracts to see what data handling requirements are included. KU researchers must, at a minimum, comply with the requirements included with their grants and contracts, as well as comply with the KU Data Classification and Handling Policy. PI’s are encouraged to meet with KU IT to discuss what is required of their research.
KU IT Security Services
KU IT provides a number of services to help protect the data and systems of the University and our customers, including:
KU Research Security Contacts
KU IT Research Support Team
firstname.lastname@example.org | 785-864-7171
KU IT Security Office
email@example.com | 785-864-9003
IT Services for Research
See Research and KU Information Technology for a repository of helpful resources including support services, IT facilities development, software development and support.
Research Data Management
See Research Data Management: Data Services and Repositories for a guide to KU Libraries' services for managing and preserving research data.