Protected Network For Research Policy
Duke faculty, staff, and students working with Sensitive research data must do so on systems that comply with the IT Security Office‘s (ITSO) technical standards (available at http://security.duke.edu/policies-procedures). Duke’s Protected Network for Research meets these requirements and provides a secure environment for the storage and analysis of Sensitive research data.
The Protected Network for Research offers the following security measures:
- All network access occurs via encrypted connections.
- Access requires a valid Duke NetID combined with multi-factor authentication.
- Authorization for data access is controlled by the IT Security Office and delegated to research Principle Investigators (PIs). Only those users approved by the (PI) are granted access.
Systems in the Protected Network for Research comply with the University IT Security Office’s Server Security Standards, which include requirements for regular patching; removal of unneeded services; centralized logging; running a host-based firewall; running an anti-virus program; and regular backups.
Backups of data stored in the Protected Network for Research are encrypted.
All workstations and laptops allowed to access the data are required by policy to enact the following protections on computers accessing the Protected Network for Research: Regular patching; running an antivirus program; encrypting laptops; and enabling a host-based firewall.
It is possible to tailor distinctive environments within the Protected Network for Research.
If you are a researcher, a description of the Protected Network for Research, including the associated security protections, is available to include with proposals.
Please contact the University IT Security Office with any questions.
Networks & Connectivity, Security