Conducting research with highly sensitive data—such as P3/P4 classified data, Protected Health Information (HIPAA), Controlled Unclassified Information (CUI), Export Controlled data, or datasets governed by strict Data Use Agreements (DUAs)—requires formal planning and approval. This ensures compliance with University of California policies (like IS-3) and external regulations.
This guide outlines the process for initiating a Data Security Plan (DSP), understanding your responsibilities, and securing the necessary infrastructure.
At UCR, a Data Security Plan is a formal, comprehensive document that outlines the Roles, Responsibilities, Guidelines, Processes, and Technical Controls essential for safeguarding your research data.
It serves as a blueprint, reviewed and approved by the Information Security Office (ISO), to ensure your research environment is constructed and maintained securely. It covers critical areas such as:
Download the official UCR Data Security Plan Template (Google Doc)
When requesting infrastructure for a confidential dataset, the Research Computing team and the ISO must first establish the compliance baseline. Before any technical solutions are proposed or hardware is purchased, researchers must complete the following intake steps:
All formal Data Security Plans and secure infrastructure setups must be anchored to a faculty data custodian. If you are a student, postdoc, or staff member initiating the request, your Principal Investigator (PI) or Faculty Advisor must be explicitly included in the communication and approve the requests. They hold the ultimate responsibility for the data.
Technical controls are driven entirely by contractual and regulatory obligations. You must provide the Data Use Agreement (DUA), the grant contract, or the specific security policy document provided by the dataset owner. We cannot architect a compliant solution without reviewing the exact stipulations regarding storage, access, encryption, and auditing required by the provider.
When contacting support, be prepared to provide a brief, high-level summary of:
The specific constraints of your DUA and the data classification will dictate which approved infrastructure you must use. UCR does not support or approve the use of standalone workstations in individual offices for highly sensitive data.
For general sensitive research data classified as P3 or P4 (e.g., standard confidential data without federal defense or specialized enclave requirements):
If your grant or DUA involves the Department of Defense (DoD), Department of Energy (DOE), NIH dbGaP, or mandates specific federal compliance frameworks like CMMC or NIST 800-171:
If you need to begin the DSP process or request secure infrastructure, please submit a request to the Research Computing team (research-computing@ucr.edu) ensuring you have: