


{"id":1513,"date":"2021-04-30T21:10:29","date_gmt":"2021-04-30T21:10:29","guid":{"rendered":"https:\/\/research.unl.edu\/researchcompliance\/?page_id=1513"},"modified":"2025-11-04T18:05:40","modified_gmt":"2025-11-04T18:05:40","slug":"research-data-security","status":"publish","type":"page","link":"https:\/\/research.unl.edu\/researchcompliance\/research-data-security\/","title":{"rendered":"Research Data &amp; Security"},"content":{"rendered":"\n<p style=\"font-size:18px\">The oversight, management, and security of research data is a vital component of many research activities. Research security is comprised of principles and actions that protect the research enterprise from misappropriation, violations of research integrity, and foreign government interference. Research security benefits us through maintaining trust, protecting economic security, safeguarding data, and nurturing innovation.&nbsp;<\/p>\n\n\n\n<p>Research plays a crucial role in driving innovation, shaping industries, and solving global challenges. From technological breakthroughs to medical advancements, our work has the power to transform societies. However, as the value of research grows, so does the risk of it being compromised. Research is increasingly targeted by cyberattacks, espionage, and theft, threatening not only the intellectual capital of individuals and organizations but also the national security and economic stability of entire countries. Unsecured research environments can lead to the unauthorized access, manipulation, or dissemination of sensitive information, potentially stalling innovation and undermining trust in academic and research institutions. Safeguarding research ensures that it is protected from malicious actors while promoting collaboration, transparency, and ethical standards.&nbsp;<\/p>\n\n\n\n<p style=\"font-size:18px\">Research security is critical to maintaining the integrity, confidentiality, and availability of research outcomes. By ensuring that research efforts remain secure, we can safeguard the future of innovation and protect the competitive advantage of institutions and nations alike.<\/p>\n\n\n\n<p>The University of Nebraska-Lincoln is committed to the stewardship and safeguarding of research\u00a0in accordance with all applicable federal, state, and university regulations. Those involved in research activities at the University of Nebraska-Lincoln (UNL) have certain rights and responsibilities with respect to research\u00a0security, data,\u00a0equipment, or other materials.\u00a0Research\u00a0from sponsored or non-sponsored\u00a0activities must be recorded, maintained and made accessible in a reasonable and responsible manner by the Principal Investigator (PI), other research personnel, and in accordance with all applicable federal, state, and university requirements.<\/p>\n\n\n\n<p>All UNL research personnel are required to comply with research\u00a0data and\u00a0security requirements. Typically, this involves research\u00a0ownership and the standards for the collection, access, security, destruction, retention, sharing, and reporting or management of breaches.<\/p>\n\n\n\n<p>To speak with someone about\u00a0these requirements, contact the Research Compliance, Integrity, and Security Office at (402) 472-6965 or\u00a0<a href=\"mailto:squinn@unl.edu\">squinn@unl.edu<\/a>.<\/p>\n\n\n\n<p>The following flowcharts have been created to assist research personnel in determining which security level may be appropriate for their research and what controls may be required.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-medium\"><a href=\"https:\/\/uofnebraska.sharepoint.com\/:b:\/r\/sites\/UNL-ResearchComplianceServicesSharepoint\/Shared%20Documents\/Research%20Compliance%20Services\/Webpages\/Research%20Data%20%26%20Security\/Published%20to%20Web\/Landing%20Page%20-%20docs\/Data%20Security%20Flowchart%20-%20EC_FINAL%20v1.0.pdf?csf=1&#038;web=1&#038;e=7wIPGS?e=2pUpFL\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"232\" src=\"https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2021\/05\/Data-Security-Flowchart-EC-FINAL-v_1.0-300x232.png\" alt=\"\" class=\"wp-image-2167\" srcset=\"https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2021\/05\/Data-Security-Flowchart-EC-FINAL-v_1.0-300x232.png 300w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2021\/05\/Data-Security-Flowchart-EC-FINAL-v_1.0-768x593.png 768w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2021\/05\/Data-Security-Flowchart-EC-FINAL-v_1.0-600x464.png 600w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2021\/05\/Data-Security-Flowchart-EC-FINAL-v_1.0-700x541.png 700w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2021\/05\/Data-Security-Flowchart-EC-FINAL-v_1.0-624x482.png 624w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2021\/05\/Data-Security-Flowchart-EC-FINAL-v_1.0.png 941w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-medium\"><a href=\"https:\/\/uofnebraska.sharepoint.com\/:b:\/r\/sites\/UNL-ResearchComplianceServicesSharepoint\/Shared%20Documents\/Research%20Compliance%20Services\/Webpages\/Research%20Data%20%26%20Security\/Published%20to%20Web\/Landing%20Page%20-%20docs\/Data%20Security%20Flowchart%20-%20IRB_FINAL%20v1.0.pdf?csf=1&#038;web=1&#038;e=huHCyv?e=0Ss18T\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"231\" src=\"https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2021\/05\/Data-Security-Flowchart-IRB-FINAL-v_1.0-300x231.png\" alt=\"\" class=\"wp-image-2168\" srcset=\"https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2021\/05\/Data-Security-Flowchart-IRB-FINAL-v_1.0-300x231.png 300w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2021\/05\/Data-Security-Flowchart-IRB-FINAL-v_1.0-768x592.png 768w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2021\/05\/Data-Security-Flowchart-IRB-FINAL-v_1.0-600x462.png 600w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2021\/05\/Data-Security-Flowchart-IRB-FINAL-v_1.0-700x539.png 700w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2021\/05\/Data-Security-Flowchart-IRB-FINAL-v_1.0-624x481.png 624w, https:\/\/research.unl.edu\/researchcompliance\/wp-content\/uploads\/sites\/22\/2021\/05\/Data-Security-Flowchart-IRB-FINAL-v_1.0.png 941w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The oversight, management, and security of research data is a vital component of many research activities. Research security is comprised of principles and actions that protect the research enterprise from misappropriation, violations of research integrity, and foreign government interference. Research security benefits us through maintaining trust, protecting economic security, safeguarding data, and nurturing innovation.&nbsp; Research [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":2156,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1513","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/research.unl.edu\/researchcompliance\/wp-json\/wp\/v2\/pages\/1513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.unl.edu\/researchcompliance\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/research.unl.edu\/researchcompliance\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/research.unl.edu\/researchcompliance\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/research.unl.edu\/researchcompliance\/wp-json\/wp\/v2\/comments?post=1513"}],"version-history":[{"count":16,"href":"https:\/\/research.unl.edu\/researchcompliance\/wp-json\/wp\/v2\/pages\/1513\/revisions"}],"predecessor-version":[{"id":4231,"href":"https:\/\/research.unl.edu\/researchcompliance\/wp-json\/wp\/v2\/pages\/1513\/revisions\/4231"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/research.unl.edu\/researchcompliance\/wp-json\/wp\/v2\/media\/2156"}],"wp:attachment":[{"href":"https:\/\/research.unl.edu\/researchcompliance\/wp-json\/wp\/v2\/media?parent=1513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}