About the program

Research information security is the collaborative safeguarding of research knowledge, intellectual property and data from unwanted or unintended access, interference or loss. Each research project has unique security needs related to the confidentiality, integrity and availability of their data, with research information security acting as a bridge between various disciplines and secure data practices.

Why RISP?

The transformative innovations generated by research make it a primary mission of the University. Research information security acts as a bridge between research initiatives and cyber security requirements; providing focused support to the research community and strategic guidance to security leadership.

Getting started

No prior information or knowledge is required to begin. Consultations are recommended throughout the research project lifecycle.

Objectives

  • Safeguard intellectual property and data integrity.

  • Reduce the regulatory burden of research.

  • Champion the values of the research community.

Guiding principles

Cyber security is bolstered by three principles: confidentiality, integrity and availability.

Confidentiality

Protecting data from being accessed by or disclosed to unauthorized individuals or entities is particularly important for sensitive and non-public data. While your research results may be made public through publication or other data sharing arrangements, confidentiality is a key consideration during active research. Implementing confidentiality measures protects your process and intellectual property and allows you to follow compliance requirements outlined by research partners and/or the research ethics board.

Integrity

An element of broader scientific, research and academic integrity, protecting data from unauthorized alteration or destruction maintains trust and confidence in research, whether within the data itself or in the institutions through which it is produced. The integrity of your research data is important, whether during active research, publication or deposit. Alterations or destruction of research data can result in data and time loss and reputational harm.

Availability

Ensuring that data is accessible and usable by authorized users when needed is essential. Whether collaborating with colleagues across the tri-campus University or across the world, or perhaps just working remotely, not being able to access your data when needed may reduce productivity and impact sponsor deadlines.

Featured topics

Improve research competitiveness and reduce administrative burdens.

Be aware of potential threats and their best defences.

Learn more about common research disruptions.

Secure your research and thwart cyber security threats.

Services

Information security advisory and support services available to researchers and support staff.

Contact

General Inquiries: Research Information Security

Information Security, Information Technology Services

Email: research.infosec@utoronto.ca