Blog Post

Compliance Requirements in Research

January 16, 2025
Contributors
Contributors
+ 2 More
+ 2 More

Screenshot 2025 01 16 at 12.12.11 PMCASC member representatives Erik Deumens from the University of Florida and Carolyn Ellis from Arizona State University authored an article featured in the January 2025 edition of Communications of the ACM, discussing the increasing demands for cyberinfrastructure to support scientific research.

“While no system design can eliminate the possibility of unauthorized access, the risk of data theft can be managed and mitigated. This is done by formulating policies, procedures, and technical controls to safeguard the data and ensuring these safeguards are followed by everyone involved with the data. Federal and state governments and companies require in contractual agreements that these controls are followed. Recently, it has become clear that just requiring this is not sufficient. Institutions are required to prove their implementation and operation of safeguarding controls. We list a few examples of new and pending requirements.”

To read the CACM article, please click here.

Related Resources

Endorsement

CNSF Trump Transition Recommendations 2025

Published January 22, 2025
Contributors
Contributors
+ 2 More
+ 2 More
Response Letter

NTIA Response on Pervasive Data Research Ethical Guidelines

Published January 16, 2025
Contributors
Contributors
+ 2 More
+ 2 More

Sign up
for our Newsletter

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.