{"id":139625,"date":"2022-04-06T13:25:08","date_gmt":"2022-04-06T17:25:08","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/?page_id=139625"},"modified":"2025-04-10T14:34:58","modified_gmt":"2025-04-10T18:34:58","slug":"security-for-researchers","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-researchers\/","title":{"rendered":"Security for Researchers"},"content":{"rendered":"<h1 aria-hidden=\"true\">Our Goal<\/h1>\n<p><!-- This h1 is not included in the accessibility tree and therefore ignored by the rule --><\/p>\n<p style=\"text-align: left;\">Boston University Information Security helps researchers conduct their research efficiently and securely. We engage researchers throughout the <a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-researchers\/researchlifecycle\">research lifecycle<\/a> to assist with navigating Data Use Agreements and regulatory requirements. We also provide support and resources to solve common use cases, such as sharing with collaborators or closing out a study.<\/p>\n<p style=\"text-align: left;\">Our goal is to reduce the security and compliance burden, letting you do what you do best \u2013 <em>groundbreaking research<\/em>.<\/p>\n<h1>Ways We Can Help<\/h1>\n<p><strong>Here are some of the most common questions we hear:<\/strong><\/p>\n<p><strong><span data-ogsc=\"rgb(51, 51, 51)\"><div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">Can you help me design a secure workflow?<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><\/span><\/strong>Yes, for example if you are collecting personally identifiable health information, we recommend storing identifiers on a <a href=\"https:\/\/www.bu.edu\/tech\/support\/storage-options\/\">BU Restricted Use network drive<\/a> or BU Microsoft Teams\/SharePoint\/OneDrive if you are collaborating with others outside BU, then analyze the anonymized data on our high performance <a href=\"https:\/\/www.bu.edu\/tech\/support\/research\/computing-resources\/scc\/\">Shared Computing Cluster (SCC)<\/a>. <strong><\/div>\n<\/div>\n<\/strong><\/p>\n<p><strong><span data-ogsc=\"rgb(51, 51, 51)\"><div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">Can BU support security requirements in my grant, contract, or DUA?<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\">\u00a0<\/span><\/strong><\/p>\n<p>Yes, we can implement most requirements on BU managed computers and servers, but for the highest security requirements of NIST 800-53, NIST 800-171, and CMMC, we are now encouraging researchers to contract with a UCSD program called <a href=\"https:\/\/sherlock.sdsc.edu\/\">Sherlock<\/a> through IS&amp;T.\u00a0 Cost for this service should be taken into consideration for grant proposals, but we will handle the contracting and security requirements for you. In some circumstances we have implemented isolated (no internet) systems, but we encourage you to consider <a href=\"https:\/\/sherlock.sdsc.edu\/\">Sherlock<\/a> instead.<\/p>\n<p style=\"font-weight: 400;\" data-ogsb=\"white\"><span data-ogsc=\"rgb(74, 84, 88)\" data-ogsb=\"yellow\">For example, the Centers for Medicare and Medicaid Services (CMS) now require all researchers to comply with NIST 800-53, and submit a Data Management Plan Security Attestation Questionnaire (DMPSAQ), detailing their plans for complying with NIST 800-53.\u00a0 Researchers will need to contract with Sherlock through IS&amp;T, but we\u2019ve completed the DMPSAQ for you.<\/span><\/p>\n<p><strong><\/div>\n<\/div>\n<\/strong><\/p>\n<p><strong><span data-ogsc=\"rgb(51, 51, 51)\"><div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">What does this security clause in my grant, contract, or DUA mean (e.g., NIST, FISMA, CUI, FCI, HIPAA Limited Data Set)?<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\">\u00a0<\/span><\/strong><\/p>\n<p>We can help with that! We regularly help researchers as well as our research contracting offices understand specific security requirements.<strong><\/div>\n<\/div>\n<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul><\/ul>\n<\/li>\n<\/ul>\n<p><strong><span data-ogsc=\"rgb(51, 51, 51)\"><div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">Are any new security regulations coming down the pike that will impact me?<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\">\u00a0<\/span><\/strong><\/p>\n<p>Yes. The Department of Defense will soon start requiring compliance with a new compliance program called <a href=\"https:\/\/dodcio.defense.gov\/CMMC\/About\/\">Cybersecurity Maturity Model Certification (CMMC)<\/a> that requires third party audits. We are working on making Shared Computing Cluster compliant with CMMC Level 1 but expect most CMMC Level 2 research will need to go to <a href=\"https:\/\/sherlock.sdsc.edu\/\">Sherlock<\/a>.<strong><\/div>\n<\/div>\n<\/strong><\/p>\n<p><strong><span data-ogsc=\"rgb(51, 51, 51)\"><div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">Can you help me fill out the security section of a proposal?<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><\/span><\/strong><\/p>\n<p>We have a few answers to <a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-researchers\/dua-security-language\/\">common security questions<\/a> here. Users of the <a href=\"https:\/\/www.bu.edu\/tech\/support\/research\/computing-resources\/scc\/\">Shared Computing Cluster (SCC)<\/a> may also wish to refer to <a href=\"https:\/\/www.bu.edu\/tech\/support\/research\/rcs\/publications-and-grants\/cyberinfrastructure-plan\/\">BU&#8217;s Cyberinfrastructure Plan.<\/a> We can always help you with other questions, just reach out to <a href=\"mailto:buinfosec@bu.edu\">buinfosec@bu.edu<\/a>. <strong><\/div>\n<\/div>\n<\/strong><\/p>\n<p><strong><span data-ogsc=\"rgb(51, 51, 51)\"><div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">Can you review my proposal to see if I am meeting security requirements?<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><\/span><\/strong><\/p>\n<p>Yes, we regularly review security requirements in proposals to ensure we can agree to any requirements. If the proposal is approved we will work with you to implement any additional controls.<\/p>\n<p>In some cases, we may be reaching out to you. When research contracts have regulatory or non-standard cybersecurity requirements, the Office of Sponsored Programs and\/or Industry Engagement will ask us to work with you to ensure your computing environment will meet contractual requirements. Some of the changes we\u2019ve seen here range from an increased focus on encryption to requiring assertions or audits of compliance with federal standards like the National Institute of Science and Technology Special Publication 800-53 (NIST 800-53). Unfortunately, not all solutions are free or fast, so if you are considering research with CMS, CHIA, or other regulated data, we encourage you to <a href=\"mailto:buinfosec@bu.edu\">contact us<\/a> early to understand the requirements, and to take advantage of templates we have prepared.<\/p>\n<p><strong><\/div>\n<\/div>\n<\/strong><\/p>\n<h1>Getting Started<\/h1>\n<p><strong>We offer the following services to help you succeed:<\/strong><\/p>\n<ul>\n<li>Check out our self help resources below.<\/li>\n<li>Schedule one-on-one consulting, to help you at any point in the <a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-researchers\/researchlifecycle\">research lifecycle<\/a>. Email us at <a href=\"mailto:buinfosec@bu.edu\">buinfosec@bu.edu<\/a> if you are at Charles River Campus or <a href=\"mailto:bumcinfosec@bu.edu\">bumcinfosec@bu.edu<\/a> if you are at the Medical Campus.<\/li>\n<li><a href=\"https:\/\/www.bu.edu\/tech\/infosec-review-of-research-contracts\/\"><span>Review of Research Contracts<\/span><\/a><\/li>\n<\/ul>\n<ul><\/ul>\n<h1>Self Help Resources<\/h1>\n<p>Please check out our resources, or reach out to <a href=\"mailto:buinfosec@bu.edu\">buinfosec@bu.edu<\/a>, and we\u2019ll help you understand how to comply with security requirements in grants, contracts, and data use agreements:<\/p>\n<div class=\"wizard-blocks  clearfix\">\n<div class='block'><div><h2>CRC Institutional Review Board Guidance<\/h2><p>As part of the Institutional Review Board's (IRB) role in protecting the rights and welfare of human subjects, researchers must identify which electronic platforms, data transfer methods, data\/document storage plans etc. are being proposed in the research. This information can be documented in the Confidentiality of Data section of the IRB application.<\/p><div class=\"wizard-go\"><a class=\"btn btn-green btn-more\" href=\"https:\/\/www.bu.edu\/researchsupport\/compliance\/human-subjects\/guidance-on-data-security\/\">Get CRC IRB Guidance<\/a><\/div><\/div><\/div>\n<div class='block'><div><h2>BUMC Institutional Review Board Guidance<\/h2><p>Further information for BUMC Researchers to ensure data security.<\/p><div class=\"wizard-go\"><a class=\"btn btn-green btn-more\" href=\"https:\/\/www.bu.edu\/crtimes\/featurearticle.htm\">Data Security Guidance<\/a><\/div><\/div><\/div><div class='' style='clear:both;'display:inline;>&nbsp;<\/div>\n<div class='block'><div><h2>BU Reviewed &amp; Cleared Apps<\/h2><p>These apps have been reviewed by the BU Information Security team and cleared for individually identifiable human subject data classified as Restricted Use or HIPAA data.<\/p><div class=\"wizard-go\"><a class=\"btn btn-green btn-more\" href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-researchers\/cleared-apps\/\">Click to See the Apps<\/a><\/div><\/div><\/div>\n<div class='block'><div><h2>Paper Record and Media Management<\/h2><p>These record management companies have been cleared for management and destruction of individually identifiable human subject data.<\/p><div class=\"wizard-go\"><a class=\"btn btn-green btn-more\" href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-researchers\/paper-and-media\/\">View Records &amp; Media Management<\/a><\/div><\/div><\/div><div class='' style='clear:both;'display:inline;>&nbsp;<\/div>\n<div class='block'><div><h2>Data Classification &amp; Services<\/h2><p>Here we outline what services are approved for each data classification.<\/p><div class=\"wizard-go\"><a class=\"btn btn-green btn-more\" href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-researchers\/data-classification-services\/\">Data Classification &amp; Services<\/a><\/div><\/div><\/div>\n<div class='block'><div><h2>Data Use Agreement Security Language<\/h2><p>Start with these examples answers for research applications that require information on our security practices.<\/p><div class=\"wizard-go\"><a class=\"btn btn-green btn-more\" href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-researchers\/dua-security-language\/\">View DUA Language<\/a><\/div><\/div><\/div><div class='' style='clear:both;'display:inline;>&nbsp;<\/div>\n<div class='block'><div><h2>Apps Not Managed by BU<\/h2><p>These apps have been reviewed for research purposes at various classification levels by the BU Information Security team. These apps are not managed by BU and accounts must be managed by the research team.<\/p><div class=\"wizard-go\"><a class=\"btn btn-green btn-more\" href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-researchers\/non-managed-apps\/\">Click here to See the Apps <\/a><\/div><\/div><\/div>\n<div class='block'><div><h2>Transcription Services Not Managed by BU<\/h2><p>These services have been reviewed by the BU Information Security team for the transcription of human subject data, as well as patient data, at BU HIPAA Components . These services are not managed by BU and accounts must be managed by the research team.<\/p><div class=\"wizard-go\"><a class=\"btn btn-green btn-more\" href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-researchers\/transcription-services\/\">View Services<\/a><\/div><\/div><\/div><div class='' style='clear:both;'display:inline;>&nbsp;<\/div>\n<\/div><strong><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our Goal Boston University Information Security helps researchers conduct their research efficiently and securely. We engage researchers throughout the research lifecycle to assist with navigating Data Use Agreements and regulatory requirements. We also provide support and resources to solve common use cases, such as sharing with collaborators or closing out a study. Our goal is&#8230;<\/p>\n","protected":false},"author":4352,"featured_media":0,"parent":99517,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"page-full-width.php","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/139625"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/4352"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=139625"}],"version-history":[{"count":50,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/139625\/revisions"}],"predecessor-version":[{"id":156798,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/139625\/revisions\/156798"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/99517"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=139625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}