Thought Leadership

Compliance Requirements in Research

January 14, 2025
Contributors
Contributors
+ 1 More

Screenshot 2025 01 16 at 12.12.11 PM

CASC member representatives Erik Deumens from the University of Florida and Carolyn Ellis from Arizona State University authored an article featured in the January 2025 edition of Communications of the ACM, discussing the increasing demands for cyberinfrastructure to support scientific research.

“While no system design can eliminate the possibility of unauthorized access, the risk of data theft can be managed and mitigated. This is done by formulating policies, procedures, and technical controls to safeguard the data and ensuring these safeguards are followed by everyone involved with the data. Federal and state governments and companies require in contractual agreements that these controls are followed. Recently, it has become clear that just requiring this is not sufficient. Institutions are required to prove their implementation and operation of safeguarding controls. We list a few examples of new and pending requirements.”

To read the CACM article, please click here.

Contributors
Contributors
+ 1 More

Related Resources

Response Letter

Published January 16, 2025
Contributors
Contributors
+ 1 More
Response Letter

CNSF FY 2025 Conference Letter

Published December 9, 2024
Contributors
Contributors
+ 1 More

Sign up
for our Newsletter

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.