Security Plan Reviews
Restricted-use data require security plans. ICPSR has extensive expertise and experience in designing and providing data security. As part of the application process for restricted-use data, ICPSR reviews data security plans. ICPSR can also review data security for data that are not disseminated by ICPSR. Moreover, ICPSR provides model plans for different levels of security. Among the security plans are: Standalone Computer for Restricted-use Data, Virtual Data Enclave, and Physical Data Enclave. The key differences among the plans are how results are vetted and how interactive processing is monitored.
If you are interested in a security plan review, please contact John E. Marcotte, ICPSR Data Security Officer, email@example.com.
Data Use Agreements (DUA) usually require site inspections to verify that projects are following security protocols. ICPSR has the expertise to audit research sites for compliance. An ISCPR inspection includes checks of computer security and interviews with research staff. The ICPSR report will document problems and propose remedies.
If you are interested in a security inspection, please contact John E. Marcotte, ICPSR Data Security Officer, ICPSR, firstname.lastname@example.org.