Our Goal
Boston University Information Security helps researchers conduct their research efficiently and securely. We engage researchers throughout the research lifecycle to assist with navigating Data Use Agreements and regulatory requirements. We also provide support and resources to solve common use cases, such as sharing with collaborators or closing out a study.
Our goal is to reduce the security and compliance burden, letting you do what you do best – groundbreaking research.
Ways We Can Help
Here are some of the most common questions we hear:
Can you help me design a secure workflow?
Yes, for example if you are collecting personally identifiable health information, we recommend storing identifiers on a
BU Restricted Use network drive or BU Microsoft Teams/SharePoint/OneDrive if you are collaborating with others outside BU, then analyze the anonymized data on our high performance
Shared Computing Cluster (SCC).
Can BU support security requirements in my grant, contract, or DUA?
Yes, we can implement most requirements on BU managed computers and servers, but for the highest security requirements of NIST 800-53, NIST 800-171, and CMMC, we are now encouraging researchers to contract with a UCSD program called Sherlock through IS&T. Cost for this service should be taken into consideration for grant proposals, but we will handle the contracting and security requirements for you. In some circumstances we have implemented isolated (no internet) systems, but we encourage you to consider Sherlock instead.
For example, the Centers for Medicare and Medicaid Services (CMS) now require all researchers to comply with NIST 800-53, and submit a Data Management Plan Security Attestation Questionnaire (DMPSAQ), detailing their plans for complying with NIST 800-53. Researchers will need to contract with Sherlock through IS&T, but we’ve completed the DMPSAQ for you.
What does this security clause in my grant, contract, or DUA mean (e.g., NIST, FISMA, CUI, FCI, HIPAA Limited Data Set)?
We can help with that! We regularly help researchers as well as our research contracting offices understand specific security requirements.
Are any new security regulations coming down the pike that will impact me?
Yes. The Department of Defense will soon start requiring compliance with a new compliance program called Cybersecurity Maturity Model Certification (CMMC) that requires third party audits. We are working on making Shared Computing Cluster compliant with CMMC Level 1 but expect most CMMC Level 2 research will need to go to Sherlock.
Can you help me fill out the security section of a proposal?
Can you review my proposal to see if I am meeting security requirements?
Yes, we regularly review security requirements in proposals to ensure we can agree to any requirements. If the proposal is approved we will work with you to implement any additional controls.
In some cases, we may be reaching out to you. When research contracts have regulatory or non-standard cybersecurity requirements, the Office of Sponsored Programs and/or Industry Engagement will ask us to work with you to ensure your computing environment will meet contractual requirements. Some of the changes we’ve seen here range from an increased focus on encryption to requiring assertions or audits of compliance with federal standards like the National Institute of Science and Technology Special Publication 800-53 (NIST 800-53). Unfortunately, not all solutions are free or fast, so if you are considering research with CMS, CHIA, or other regulated data, we encourage you to contact us early to understand the requirements, and to take advantage of templates we have prepared.
Getting Started
We offer the following services to help you succeed:
Self Help Resources
Please check out our resources, or reach out to buinfosec@bu.edu, and we’ll help you understand how to comply with security requirements in grants, contracts, and data use agreements:
CRC Institutional Review Board Guidance
As part of the Institutional Review Board's (IRB) role in protecting the rights and welfare of human subjects, researchers must identify which electronic platforms, data transfer methods, data/document storage plans etc. are being proposed in the research. This information can be documented in the Confidentiality of Data section of the IRB application.
BUMC Institutional Review Board Guidance
Further information for BUMC Researchers to ensure data security.
BU Reviewed & Cleared Apps
These apps have been reviewed by the BU Information Security team and cleared for individually identifiable human subject data classified as Restricted Use or HIPAA data.
Paper Record and Media Management
These record management companies have been cleared for management and destruction of individually identifiable human subject data.
Data Classification & Services
Here we outline what services are approved for each data classification.
Data Use Agreement Security Language
Start with these examples answers for research applications that require information on our security practices.
Apps Not Managed by BU
These apps have been reviewed for research purposes at various classification levels by the BU Information Security team. These apps are not managed by BU and accounts must be managed by the research team.
Transcription Services Not Managed by BU
These services have been reviewed by the BU Information Security team for the transcription of human subject data, as well as patient data, at BU HIPAA Components . These services are not managed by BU and accounts must be managed by the research team.