{"id":186,"date":"2021-08-12T16:00:58","date_gmt":"2021-08-12T23:00:58","guid":{"rendered":"https:\/\/dev7.rtd.asu.edu\/?page_id=186"},"modified":"2024-10-21T13:52:17","modified_gmt":"2024-10-21T20:52:17","slug":"secure-research","status":"publish","type":"page","link":"https:\/\/rto.asu.edu\/research-data-management\/secure-research\/","title":{"rendered":"Secure Research"},"content":{"rendered":"<div class=\"wp-bootstrap-blocks-container container mb-0 my-6 my-xl-12\">\n\t\n\n<p class=\"lead\">Arizona State University supports secure research services for investigators working with sensitive data. The Research Technology Office, through campus partnerships and collaborations with vendors and sister institutions, provides secure storage options, private-cloud computing facilities and support for collecting and managing human subjects data.<\/p>\n\n<\/div>\n\n\n<div class=\"wp-bootstrap-blocks-container container mb-0 my-6 my-xl-12\">\n\t\n<h2  > <span >KE Secure Cloud<\/span><\/h2>\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-between\">\n\t\n\n<div class=\"col-12 col-md-7\">\n\t\t\t\n\n<p>Knowledge Enterprise, maintains a secure research environment to support researchers working with sensitive data. KE Secure Cloud provides a technology infrastructure that facilitates academic research into areas that require the analysis of sensitive or restricted data. The platform includes both storage and compute resources and is highly partitioned to ensure project integrity.<\/p>\n\n\n\n<p>Requests for access to the KE Secure Cloud are reviewed internally to ensure that the research meets the criteria. At this stage additional approvals may be required and other internal processes (e.g. IRB) may need to be completed. If the data required for the research are being requested from a third party such as a health department, approved requests will be submitted to the data owner for their approval. When all approvals are received, Knowledge Enterprise technical staff will work with the researcher to create a secure compute and data space with the appropriate capacity and software.<\/p>\n\n\n\n<p>Contact the\u00a0<a href=\"https:\/\/asu.service-now.com\/sp?id=sc_category&amp;sys_id=35b7bb641bd9ce50b35e0fe0cd4bcb7a&amp;catalog_id=e0d08b13c3330100c8b837659bba8fb4\">Research Data Management Office<\/a>\u00a0for more information.<\/p>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-4\">\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/rto.asu.edu\/research-data-management\/wp-content\/uploads\/sites\/3\/2021\/08\/shutterstock_1687333489-3-1024x683.jpg\" alt=\"\" class=\"wp-image-202\" srcset=\"https:\/\/rto.asu.edu\/research-data-management\/wp-content\/uploads\/sites\/3\/2021\/08\/shutterstock_1687333489-3-1024x683.jpg 1024w, https:\/\/rto.asu.edu\/research-data-management\/wp-content\/uploads\/sites\/3\/2021\/08\/shutterstock_1687333489-3-300x200.jpg 300w, https:\/\/rto.asu.edu\/research-data-management\/wp-content\/uploads\/sites\/3\/2021\/08\/shutterstock_1687333489-3-768x512.jpg 768w, https:\/\/rto.asu.edu\/research-data-management\/wp-content\/uploads\/sites\/3\/2021\/08\/shutterstock_1687333489-3-1536x1024.jpg 1536w, https:\/\/rto.asu.edu\/research-data-management\/wp-content\/uploads\/sites\/3\/2021\/08\/shutterstock_1687333489-3.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\t<\/div>\n\n<\/div>\n\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-186","page","type-page","status-publish","hentry"],"uds_featured_image":null,"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secure Research - Research Technology Office<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rto.asu.edu\/research-data-management\/secure-research\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Research - Research Technology Office\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rto.asu.edu\/research-data-management\/secure-research\/\" \/>\n<meta property=\"og:site_name\" content=\"Research Technology Office\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-21T20:52:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rto.asu.edu\/research-data-management\/wp-content\/uploads\/sites\/3\/2021\/08\/shutterstock_1687333489-3-1024x683.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rto.asu.edu\\\/research-data-management\\\/secure-research\\\/\",\"url\":\"https:\\\/\\\/rto.asu.edu\\\/research-data-management\\\/secure-research\\\/\",\"name\":\"Secure Research - Research Technology Office\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rto.asu.edu\\\/research-data-management\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/rto.asu.edu\\\/research-data-management\\\/secure-research\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/rto.asu.edu\\\/research-data-management\\\/secure-research\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rto.asu.edu\\\/research-data-management\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/08\\\/shutterstock_1687333489-3-1024x683.jpg\",\"datePublished\":\"2021-08-12T23:00:58+00:00\",\"dateModified\":\"2024-10-21T20:52:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rto.asu.edu\\\/research-data-management\\\/secure-research\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rto.asu.edu\\\/research-data-management\\\/secure-research\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/rto.asu.edu\\\/research-data-management\\\/secure-research\\\/#primaryimage\",\"url\":\"https:\\\/\\\/rto.asu.edu\\\/research-data-management\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/08\\\/shutterstock_1687333489-3.jpg\",\"contentUrl\":\"https:\\\/\\\/rto.asu.edu\\\/research-data-management\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/08\\\/shutterstock_1687333489-3.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rto.asu.edu\\\/research-data-management\\\/secure-research\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rto.asu.edu\\\/research-data-management\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure Research\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rto.asu.edu\\\/research-data-management\\\/#website\",\"url\":\"https:\\\/\\\/rto.asu.edu\\\/research-data-management\\\/\",\"name\":\"Research Technology Office\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rto.asu.edu\\\/research-data-management\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure Research - Research Technology Office","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rto.asu.edu\/research-data-management\/secure-research\/","og_locale":"en_US","og_type":"article","og_title":"Secure Research - Research Technology Office","og_url":"https:\/\/rto.asu.edu\/research-data-management\/secure-research\/","og_site_name":"Research Technology Office","article_modified_time":"2024-10-21T20:52:17+00:00","og_image":[{"url":"https:\/\/rto.asu.edu\/research-data-management\/wp-content\/uploads\/sites\/3\/2021\/08\/shutterstock_1687333489-3-1024x683.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/rto.asu.edu\/research-data-management\/secure-research\/","url":"https:\/\/rto.asu.edu\/research-data-management\/secure-research\/","name":"Secure Research - Research Technology Office","isPartOf":{"@id":"https:\/\/rto.asu.edu\/research-data-management\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rto.asu.edu\/research-data-management\/secure-research\/#primaryimage"},"image":{"@id":"https:\/\/rto.asu.edu\/research-data-management\/secure-research\/#primaryimage"},"thumbnailUrl":"https:\/\/rto.asu.edu\/research-data-management\/wp-content\/uploads\/sites\/3\/2021\/08\/shutterstock_1687333489-3-1024x683.jpg","datePublished":"2021-08-12T23:00:58+00:00","dateModified":"2024-10-21T20:52:17+00:00","breadcrumb":{"@id":"https:\/\/rto.asu.edu\/research-data-management\/secure-research\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rto.asu.edu\/research-data-management\/secure-research\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rto.asu.edu\/research-data-management\/secure-research\/#primaryimage","url":"https:\/\/rto.asu.edu\/research-data-management\/wp-content\/uploads\/sites\/3\/2021\/08\/shutterstock_1687333489-3.jpg","contentUrl":"https:\/\/rto.asu.edu\/research-data-management\/wp-content\/uploads\/sites\/3\/2021\/08\/shutterstock_1687333489-3.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/rto.asu.edu\/research-data-management\/secure-research\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rto.asu.edu\/research-data-management\/"},{"@type":"ListItem","position":2,"name":"Secure Research"}]},{"@type":"WebSite","@id":"https:\/\/rto.asu.edu\/research-data-management\/#website","url":"https:\/\/rto.asu.edu\/research-data-management\/","name":"Research Technology Office","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rto.asu.edu\/research-data-management\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/rto.asu.edu\/research-data-management\/wp-json\/wp\/v2\/pages\/186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rto.asu.edu\/research-data-management\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rto.asu.edu\/research-data-management\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rto.asu.edu\/research-data-management\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/rto.asu.edu\/research-data-management\/wp-json\/wp\/v2\/comments?post=186"}],"version-history":[{"count":0,"href":"https:\/\/rto.asu.edu\/research-data-management\/wp-json\/wp\/v2\/pages\/186\/revisions"}],"wp:attachment":[{"href":"https:\/\/rto.asu.edu\/research-data-management\/wp-json\/wp\/v2\/media?parent=186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}