Faculty research and data protection is extremely important to UCI, but especially important in Social Ecology where many of our faculty are working with sensitive data that requires additional data security protections.
Our mission is to ensure research is compliant with government and university policies.
Here, you will find links to the resources, methods, and tools we provide to make this happen.
IS-3 Policy
UC's Electronic Information Security Policy (IS-3) defines requirements for the appropriate classification of Institutional Information and IT Resources to ensure their confidentiality, integrity and availability.
Read more from UCI's Information Security department.
https://security.uci.edu/security-plan/plan-classification.html
Resources
Data Classification
UCI Information Security - Data Classification
P1 Information intended and released for public use. |
P2 Information that may be shared only within the UCI community. |
P3 Confidential and sensitive information, intended only for those with a "business need to know." |
P4 High-risk information that requires strict controls. |
The University intentionally provides this information to the public. | The University chooses to keep this information private, but its disclosure would not cause material harm. | Disclosure of this information beyond intended recipients might cause material harm to individuals or the University. | Disclosure of this information beyond specified recipients would likely cause serious harm to individuals or the University. |
Examples:
|
Examples:
|
Examples:
|
Examples:
|
Need more help determining the classification?
UCI Information Security - Classification Decision Tree
To secure your P4 data, SE Computing is here to help you work directly with Sherlock. Reach out to us today!
Data Storage
In Depth Chart: UCI Information Security - Research Security
Campus Research Storage Pool (CRSP) |
UCI Secure Research Environment (SRE) |
UCSD Sherlock | |
P1 | |||
P2 | |||
P3 | |||
P4 |
LEGEND |
|
Allowed | |
Contact se.computing@uci.edu |
Cloud Computing
UCI Cloud Computing Security Policy, Standards and Procedures
If you have research computing needs, and would like help, we are here to guide you! Please, reach out and let us know what questions you may have.
Note: Not all departments have the same type of research as Social Ecology, so these may differ in other Schools around campus.
Research Data Backup
OIT has obtained a campus license through CrashPlan that will help backup your important research data. SE Computing is here to help guide you through the setup process, and answer any questions you might have. Reach out to us today!
**Please note: CrashPlan is a backup system to be used in case of emergencies. We do not want to encourage people to STORE files on their laptops, but rather to hold UCI research data securely. CrashPlan is used to prevent loss of data due to viruses or some other catastrophic event.
Contacts
The Unit Information Security Lead (UISL) is the Workforce Member assigned responsibility for tactical implementation of IS-3 and the coordination and oversight of information security activities within a Unit.
To learn more about security roles here at UCI.
- SE'sTechnical UISL
Jennifer Lane - SE's Administrative UISL
Jennifer dos Santos - Another point of contact in SE: Associate Dean for Research and Faculty Development
Candice Odgers