Information and Data Security

Research IT

Research IT provides front line support for researchers working with sensitive data. We also coordinate with the Information Security Office, IPIRA, and others to assess and plan for managing highly sensitive data. Contact Research IT consultants (research-it-consulting@lists.berkeley.edu) to connect with our network of experts and to learn more about our services for working with sensitive data.

Research IT also offers several research computing and data management environments:

  • Secure Research Data and Compute (SRDC) platform has been developed for researchers working with highly sensitive (P4) data. This platform includes secure storage, high performance computing, and computing on virtual machines with desktop environments.
  • Savio, UC Berkeley’s high performance computing cluster, may be used for moderately sensitive (P2/P3) data. Savio is suitable for a wide range of research applications, including tightly coupled applications that require a low latency, high bandwidth interconnect, or very fast I/O.
  • Analytics Environment on Demand (AEoD) provides a Windows-friendly virtual machine service and may be used for computation over moderately sensitive (P2/P3) data. AEoD is most suitable for researchers needing interactive computing using common software packages (Stata, ArcGIS, RStudio, etc.) in a familiar desktop environment.

Information Security Office

The UC Berkeley Information Security Office (ISO) provides services and consulting that help support researchers working with Protected Data. ISO can assist researchers in complying with UCB campus security requirements, California's Committee for the Protection of Human Subjects (CPHS) data security requirements, and additional data security requirements found in external Data Use Agreements (DUAs). Learn more about the services and resources ISO offers to researchers.

UC Office of the President

Information Security Quick Start Guides

Find checklists of information security action items tailored to your role, whether you're a researcher, staff member, or chief information officer. These UCOP guides offer additional cybersecurity measures beyond the baseline practices required for all users and all devices. https://security.ucop.edu/policies/quick-start-guides-by-role/

Resources for securing electronic environments, including security tips and links to cybersecurity services across the UC system.

https://security.ucop.edu/resources/location-resources.html