Data Security

Researchers are pulled to both extremes of the data security spectrum. On the one end, open data. Sensitive, confidential and restricted use data, on the other hand, must be secured with care. Assessing whether your data need certain kinds of precautions and then finding the appropriate environment that allows you to perform your research in the most efficient manner can be a challenging task. Research IT can help with both. 

Our consultants provide front line support for researchers working with moderately sensitive data (P2-P3). We also help researchers work with the security office to assess and plan for managing highly sensitive data. 

Contact Research IT consultants (research-it-consulting@lists.berkeley.edu) to connect with our network of experts.

Research data lifecycle: