Skip to main content

Social Ecology Faculty Research Information

Faculty research and data protection is extremely important to UCI, but especially important in Social Ecology where many of our faculty are working with sensitive data that requires additional data security protections.
Our mission is to ensure research is compliant with government and university policies. 
Here, you will find links to the resources, methods, and tools we provide to make this happen.

IS-3 Policy

UC's Electronic Information Security Policy (IS-3) defines requirements for the appropriate classification of Institutional Information and IT Resources to ensure their confidentiality, integrity and availability.

Read more from UCI's Information Security department.
https://security.uci.edu/security-plan/plan-classification.html

 

Resources


Data Classification
 

UCI Information Security - Data Classification

P1 - Public Information

The University intentionally provides this information to the public.

Examples:

  • Public-facing websites
  • Course catalogs
  • Published research
  • Press releases
  • Parking information
P2 - UCI Community Only

The University chooses to keep this information private, but its disclosure would not cause material harm.

Examples:

  • Routine business records
  • Building plans
  • Draft research papers
  • Unpublished research
  • De-identified research data
  • UCI directory information (faculty, staff, and students who have not requested a FERPA block).
P3 - Confidential

Disclosure of this information beyond intended recipients might cause material harm to individuals or the University.

Examples:

  • Student records
  • UC Personnel records
  • IT security information
  • Security camera recordings
  • Export-controlled research
P4 - High-Risk

Disclosure of this information beyond specified recipients would likely cause serious harm to individuals or the University.

Examples:

  • Credit card information
  • Payroll information
  • Financial aid information
  • Protected health information (PHI)
  • Social Security numbers
  • Sensitive identifiable human subject research data
  • Passwords, PINs, passphrases, or other authentication secrets.
  • Protected Personally Identifiable Information (PII) in large data sets


Need more help determining the classification?
UCI Information Security - Classification Decision Tree

To secure your P4 data, SE Computing is here to help you work directly with Sherlock.  Reach out to us today!

Data Storage


In Depth Chart: UCI Information Security - Research Security
 

LEGEND

Allowed
Image removed.Contact se.computing@uci.edu

Cloud Computing

UCI Cloud Computing Security Policy, Standards and Procedures

If you have research computing needs, and would like help, we are here to guide you!  Please, reach out and let us know what questions you may have.

Note: Not all departments have the same type of research as Social Ecology, so these may differ in other Schools around campus.


Research Data Backup

OIT has obtained a campus license through CrashPlan that will help backup your important research data.  SE Computing is here to help guide you through the setup process, and answer any questions you might have.  Reach out to us today!
**Please note:  CrashPlan is a backup system to be used in case of emergencies.  We do not want to encourage people to STORE files on their laptops, but rather to hold UCI research data securely. CrashPlan is used to prevent loss of data due to viruses or some other catastrophic event. 

Contacts

The Unit Information Security Lead (UISL) is the Workforce Member assigned responsibility for tactical implementation of IS-3 and the coordination and oversight of information security activities within a Unit.
To learn more about security roles here at UCI.