Blog Post

Compliance Requirements in Research

January 16, 2025

CASC member representatives Erik Deumens from the University of Florida and Carolyn Ellis from Arizona State University authored an article featured in the January 2025 edition of Communications of the ACM, discussing the increasing demands for cyberinfrastructure to support scientific research.

“While no system design can eliminate the possibility of unauthorized access, the risk of data theft can be managed and mitigated. This is done by formulating policies, procedures, and technical controls to safeguard the data and ensuring these safeguards are followed by everyone involved with the data. Federal and state governments and companies require in contractual agreements that these controls are followed. Recently, it has become clear that just requiring this is not sufficient. Institutions are required to prove their implementation and operation of safeguarding controls. We list a few examples of new and pending requirements.”

To read the CACM article, please click here.

Related Resources

Positions Paper

Teaming Up for Impact: Regional Collaborations for Research Computing and...

Published July 31, 2025
Positions Paper

NIST SP 800-171 – Guidance for Research Computing and Data...

Published July 28, 2025