{"id":144053,"date":"2023-03-13T13:23:00","date_gmt":"2023-03-13T17:23:00","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/?page_id=144053"},"modified":"2023-06-14T10:12:12","modified_gmt":"2023-06-14T14:12:12","slug":"researchlifecycle","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-researchers\/researchlifecycle\/","title":{"rendered":""},"content":{"rendered":"<h1 aria-hidden=\"true\" style=\"text-align: center;\"><a href=\"https:\/\/www.bu.edu\/researchsupport\/\">Research Lifecycle<\/a><\/h1>\n<p>From preparing your proposal, to reviewing a Data Use Agreement and closing out your research, Information Security is here to help you throughout the research lifecycle with <a href=\"https:\/\/www.bu.edu\/research\/ethics-compliance\/research-security\/\">research security<\/a>. We are typically involved in the following steps of the cycle, but are <a href=\"mailto:buinfosec@bu.edu\">available to consult<\/a> at anytime:<\/p>\n<p><strong><span data-ogsc=\"rgb(51, 51, 51)\"><div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">Prepare a Proposal<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><\/span>\u00a0<\/strong>When preparing a proposal, the Sponsor may ask for security information about the server or services you will use. We provide a list of <a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-researchers\/data-classification-services\/\">approved services<\/a> here and we provide security information about the <a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-researchers\/dua-security-language\/\">BU managed network drive and BU managed computers<\/a>. \u00a0<\/div>\n<\/div>\n<\/p>\n<p><strong><span data-ogsc=\"rgb(51, 51, 51)\"><div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">Award Review and Acceptance<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><\/span>\u00a0<\/strong>When Office of Sponsored Programs, Industry Engagement, or other BU contracting offices review a research contract that has special security requirements, they will ask BU Information Security to conduct a review.\u00a0 As part of that review, we will reach out to the PI and ask about the devices and services that will be used.\u00a0 Our role is to ensure that researchers are using devices and services that comply with the contractual requirements.\u00a0 In some cases, we will work with IS&amp;T or the applicable IT support group to add any additional security controls required by the contract.<\/div>\n<\/div>\n<\/p>\n<p><strong><span data-ogsc=\"rgb(51, 51, 51)\"><div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">Conducting Research<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><\/span><\/strong>When conducting research, you many need to use <a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-researchers\/transcription-services\/\">transcription services<\/a>, <a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-researchers\/cleared-apps\/\">BU managed apps<\/a>, or even <a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-researchers\/non-managed-apps\/\">apps not managed by BU<\/a> but have been reviewed and cleared by BU InfoSec.<\/div>\n<\/div>\n<\/p>\n<p><strong><span data-ogsc=\"rgb(51, 51, 51)\"><div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">Close Out an Award<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><\/span><\/strong>When closing out an IRB or Award, you will generally need to retain the data for seven years on <a href=\"https:\/\/www.bu.edu\/tech\/support\/storage-options\/\">BU approved storage<\/a>, as required by the <a href=\"https:\/\/www.bu.edu\/policies\/record-retention\/\">BU Record Retention Policy<\/a>.<\/div>\n<\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Research Lifecycle From preparing your proposal, to reviewing a Data Use Agreement and closing out your research, Information Security is here to help you throughout the research lifecycle with research security. We are typically involved in the following steps of the cycle, but are available to consult at anytime:&#8230;<\/p>\n","protected":false},"author":4352,"featured_media":0,"parent":139625,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"page-full-width.php","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/144053"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/4352"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=144053"}],"version-history":[{"count":23,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/144053\/revisions"}],"predecessor-version":[{"id":146230,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/144053\/revisions\/146230"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/139625"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=144053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}