Faculty research and data protection is extremely important to UCI, but especially important in Social Ecology where many of our faculty are working with sensitive data that requires additional data security protections.
Our mission is to ensure research is compliant with government and university policies.
Here, you will find links to the resources, methods, and tools we provide to make this happen.
IS-3 Policy
UC's Electronic Information Security Policy (IS-3) defines requirements for the appropriate classification of Institutional Information and IT Resources to ensure their confidentiality, integrity and availability.
Read more from UCI's Information Security department.
https://security.uci.edu/security-plan/plan-classification.html
Resources
Data Classification
UCI Information Security - Data Classification
The University intentionally provides this information to the public.
Examples:
- Public-facing websites
- Course catalogs
- Published research
- Press releases
- Parking information
The University chooses to keep this information private, but its disclosure would not cause material harm.
Examples:
- Routine business records
- Building plans
- Draft research papers
- Unpublished research
- De-identified research data
- UCI directory information (faculty, staff, and students who have not requested a FERPA block).
Disclosure of this information beyond intended recipients might cause material harm to individuals or the University.
Examples:
- Student records
- UC Personnel records
- IT security information
- Security camera recordings
- Export-controlled research
Disclosure of this information beyond specified recipients would likely cause serious harm to individuals or the University.
Examples:
- Credit card information
- Payroll information
- Financial aid information
- Protected health information (PHI)
- Social Security numbers
- Sensitive identifiable human subject research data
- Passwords, PINs, passphrases, or other authentication secrets.
- Protected Personally Identifiable Information (PII) in large data sets
Need more help determining the classification?
UCI Information Security - Classification Decision Tree
To secure your P4 data, SE Computing is here to help you work directly with Sherlock. Reach out to us today!
Data Storage
In Depth Chart: UCI Information Security - Research Security
LEGEND | |
![]() | Allowed |
Contact se.computing@uci.edu |
Cloud Computing
UCI Cloud Computing Security Policy, Standards and Procedures
If you have research computing needs, and would like help, we are here to guide you! Please, reach out and let us know what questions you may have.
Note: Not all departments have the same type of research as Social Ecology, so these may differ in other Schools around campus.
Research Data Backup
OIT has obtained a campus license through CrashPlan that will help backup your important research data. SE Computing is here to help guide you through the setup process, and answer any questions you might have. Reach out to us today!
**Please note: CrashPlan is a backup system to be used in case of emergencies. We do not want to encourage people to STORE files on their laptops, but rather to hold UCI research data securely. CrashPlan is used to prevent loss of data due to viruses or some other catastrophic event.
Contacts
The Unit Information Security Lead (UISL) is the Workforce Member assigned responsibility for tactical implementation of IS-3 and the coordination and oversight of information security activities within a Unit.
To learn more about security roles here at UCI.
- SE'sTechnical UISL
Jennifer Lane - SE's Administrative UISL
Jennifer dos Santos - Another point of contact in SE: Director of Research and Faculty Development
Candice Odgers