UUÖ±²¥

Research

Cybersecurity is essential to research at UUÖ±²¥.

Familiarize yourself with basic security practices to protect your identity and safeguard your data.Ìý

Data is a component of ethical research. The way data is collected, stored and processed can affect the following, andÌý potentially affect your ability to research:

  • Grant approval and compliance
  • IP protection
  • Confidentiality of patients’ data

Find out more on the Research and Innovation website.

Connecting at UUÖ±²¥

UUÖ±²¥ is a constant target of cyber attacks. Safeguard your research data and personal information with the following resources:

  • that attempt to steal your personal information.
  • Password tips:
    • that is unique to your UUÖ±²¥ account.
    • Do not share your password with anyone.
    • Do not use your UUÖ±²¥ password on external systems.
  • Enable two-factor authentication on your UUÖ±²¥ account. Two-factor authentication (2FA) is required on all UUÖ±²¥ accounts because it helps verify that you are the person who is signing into your account.Don’t delay, enroll now at
  • Keep your devices up to date:

Prevent fraud

Be aware that hackers often study an organization, learn its financial approval processes, and target approvers. Some signs of attempted fraud may include:

  • An urgent email asking you to approve a request without going through the standard process
  • The email address of a message appears to be from UUÖ±²¥ but is not - refer to the link in the above section to learn more aboutÌýphishing scams.Ìý

For more information, the following resources are available:

Choosing the right tools for research

UUÖ±²¥ is committed to providing you with the tools you need to support your research. See the full list of UUÖ±²¥-approved cloud services for software supporting secure data storage, file sharing, publishing and collaboration.

Below are some examples of these and other solutions:

Research software and services

Collaborate, share and store:

  • : A robust suite of integrated applications, O365 offers a variety of tools enabling collaboration, data storage, videoconferencing, and more.
    • : Secure cloud-based file storage and sharing
    • : A chat-based group collaboration space enablingÌýcommunicatingÌýand information sharingÌýin a single location
  • :ÌýPrimary web-based solution used at UUÖ±²¥ to manage records or final versions of documents.
  • : Files stored on UUÖ±²¥'s network are regularly backed up and can be restored in case of accidental data loss.

Collect your data

  • Conduct interviews: Several web conferencing solutions are available to researchers.
    • : Enterprise web conferencing platformÌýfor meetings, training and events
    • : Web and audio conferencing features in addition to collaboration and file sharing capabilities
  • Surveys / forms:
    • : Allows users to create and publish surveys to a public or a private audience.
    • : Quickly and easily create quizzes, registration forms, and polls.

Securely store data

:

  • Secure cloud-based file storage and sharing solution
  • Intellectual property and personal data are protected in OneDrive's secure environment

Encrypt your files and computer

Encryption is a means of protecting the data stored on your computer. Data encryption is strongly recommended for anyone storing confidential data on their laptops. In case your device is stolen or left unattended, no one will be able to access your encrypted files without entering the password (also known as the encryption key).

  • (for UUÖ±²¥-managed computers)

Host websites

Create and publish websites using the following UUÖ±²¥ platforms:

  • : UUÖ±²¥'s primary centrally-supported web publishing platform: a user-friendly, feature-rich, method of building and maintaining web pages.
  • : Publish independently designed websites on a centrally managed system that is secure, reliable and easily recoverable, with a reduced risk of server downtime

Use UUÖ±²¥'s research networks

Researchers at UUÖ±²¥ have access to secure networks with guaranteed high bandwidths.

Digital research services hub

Consultation and training for researchers seeking technical services and support. Visit the Digital research services website.

IT Support for research administration

UUÖ±²¥ provides IT support to administrative units that assist academics with their applications for research funds or research ethics approval. .

Acquiring software solutions

Buying new software? All storage and collaborations must be UUÖ±²¥-approved and comply with the UUÖ±²¥ Cloud Directive - for all IT policies, see IT Policies, Regulations, Directives & Standards.

Other considerations when acquiring software:

  • Software Piracy : Unauthorized software use can have serious consequences. Ensure that your software use compliesÌýwith licensingÌýagreements.
  • The Cloud services website provides information including:
    • Cloud solution approval process
    • Types of data and what can be stored in the cloud
    • List of approved solutions at UUÖ±²¥

Traveling for research

Use the following resources to keep your devices, research data and personal information safe while travelling.

Connecting remotely

  • : The UUÖ±²¥ VPN allows for secure communications over the Internet. You will need VPN to access UUÖ±²¥ restricted sites and resources.
  • : Access the UUÖ±²¥ network without having to plug in to a network jack.
    • : An authentication service that allows users to securely access the wireless networks of other educational institutions with the credentials they use at their home institution.
    • Use UUÖ±²¥-provisioned services designed to provide consistent secure access globally, such as , , etc.

Encrypt your files and computer

Encryption is a means of protecting the data stored on your computer. Data encryption is strongly recommended for anyone storing confidential data on their laptops. In case your device is stolen or left unattended, no one will be able to access your encrypted files without entering the password (also known as the encryption key).

  • (for UUÖ±²¥-managed computers)

Staying safe while working remotely

  • Working remotely: setup information, tools and resources
  • : stay safe online while you're on the move.
Ìý

Ìý

Ìý

Back to top