Skip to main content

Social Ecology Faculty Research Information

Faculty research and data protection is extremely important to UCI, but especially important in Social Ecology where many of our faculty are working with sensitive data that requires additional data security protections.

Our mission is to ensure research is compliant with government and university policies. 

Here, you will find links to the resources, methods, and tools we provide to make this happen.

IS-3 Policy

UC's Electronic Information Security Policy (IS-3) defines requirements for the appropriate classification of Institutional Information and IT Resources to ensure their confidentiality, integrity and availability.



Read more from UCI's Information Security department.

https://security.uci.edu/security-plan/plan-classification.html

 

Resources


Data Classification

 

UCI Information Security - Data Classification

P1

Information intended and released for public use.
P2

Information that may be shared only within the UCI community.
P3

Confidential and sensitive information, intended only for those with a "business need to know."
P4

High-risk information that requires strict controls.
The University intentionally provides this information to the public. The University chooses to keep this information private, but its disclosure would not cause material harm. Disclosure of this information beyond intended recipients might cause material harm to individuals or the University. Disclosure of this information beyond specified recipients would likely cause serious harm to individuals or the University.

Examples:

  • Public-facing websites
  • Course catalogs
  • Published research
  • Press releases
  • Parking information

Examples:

  • Routine business records
  • Building plans
  • Draft research papers
  • Unpublished research
  • De-identified research data
  • UCI directory information (faculty, staff and students who have not requested a FERPA block).

Examples:

  • Student records
  • UC Personnel records
  • IT security information
  • Security camera recordings
  • Export-controlled research

Examples:

  • Credit card information
  • Payroll information
  • Financial aid information
  • Protected health information (PHI)
  • Social security numbers
  • Sensitive identifiable human subject research data
  • Passwords, PINs, passphrases, or other authentication secrets.
  • Protected Personally Identifiable Information (PII) in large data sets



Need more help determining the classification?

UCI Information Security - Classification Decision Tree



To secure your P4 data, SE Computing is here to help you work directly with Sherlock.  Reach out to us today!

Data Storage



In Depth Chart: UCI Information Security - Research Security

 

LEGEND

Allowed
Contact se.computing@uci.edu

Cloud Computing

UCI Cloud Computing Security Policy, Standards and Procedures

If you have research computing needs, and would like help, we are here to guide you!  Please, reach out and let us know what questions you may have.

Note: Not all departments have the same type of research as Social Ecology, so these may differ in other Schools around campus.



Research Data Backup

OIT has obtained a campus license through CrashPlan that will help backup your important research data.  SE Computing is here to help guide you through the setup process, and answer any questions you might have.  Reach out to us today!

**Please note:  CrashPlan is a backup system to be used in case of emergencies.  We do not want to encourage people to STORE files on their laptops, but rather to hold UCI research data securely. CrashPlan is used to prevent loss of data due to viruses or some other catastrophic event. 

Contacts

The Unit Information Security Lead (UISL) is the Workforce Member assigned responsibility for tactical implementation of IS-3 and the coordination and oversight of information security activities within a Unit.

To learn more about security roles here at UCI.