About the program
Research information security is the collaborative safeguarding of research knowledge, intellectual property and data from unwanted or unintended access, interference or loss. Each research project has unique security needs related to the confidentiality, integrity and availability of their data, with research information security acting as a bridge between various disciplines and secure data practices.
Why RISP?
The transformative innovations generated by research make it a primary mission of the University. Research information security acts as a bridge between research initiatives and cyber security requirements; providing focused support to the research community and strategic guidance to security leadership.
Getting started
No prior information or knowledge is required to begin. Consultations are recommended throughout the research project lifecycle.
Objectives
Guiding principles
Cyber security is bolstered by three principles: confidentiality, integrity and availability.
Confidentiality
Protecting data from being accessed by or disclosed to unauthorized individuals or entities is particularly important for sensitive and non-public data. While your research results may be made public through publication or other data sharing arrangements, confidentiality is a key consideration during active research. Implementing confidentiality measures protects your process and intellectual property and allows you to follow compliance requirements outlined by research partners and/or the research ethics board.
Integrity
An element of broader scientific, research and academic integrity, protecting data from unauthorized alteration or destruction maintains trust and confidence in research, whether within the data itself or in the institutions through which it is produced. The integrity of your research data is important, whether during active research, publication or deposit. Alterations or destruction of research data can result in data and time loss and reputational harm.
Availability
Ensuring that data is accessible and usable by authorized users when needed is essential. Whether collaborating with colleagues across the tri-campus University or across the world, or perhaps just working remotely, not being able to access your data when needed may reduce productivity and impact sponsor deadlines.
Featured topics
Improve research competitiveness and reduce administrative burdens.
Be aware of potential threats and their best defences.
Learn more about common research disruptions.
Secure your research and thwart cyber security threats.
Services
Information security advisory and support services available to researchers and support staff.
Resources
Government resources
Contact
General Inquiries: Research Information Security
Information Security, Information Technology Services
Email: research.infosec@utoronto.ca