{"id":19472,"date":"2021-06-20T23:29:32","date_gmt":"2021-06-20T23:29:32","guid":{"rendered":"https:\/\/www.rochester.edu\/provost\/?page_id=19472"},"modified":"2023-11-16T10:52:32","modified_gmt":"2023-11-16T15:52:32","slug":"research-data-security-classifications","status":"publish","type":"page","link":"https:\/\/www.rochester.edu\/provost\/university-data\/data-governance-overview\/research-data-security-classifications\/","title":{"rendered":"Research Data Security Classifications"},"content":{"rendered":"<p>The University is committed to the free and open exchange of knowledge, including research data. However, there are instances when the premature or unintended release of the data can result in negative consequences for the investigator or the University. This page provides guidelines about how to classify research data into different risk categories, and about how to apply best practices to store, share, and manage research data with different risk classifications.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The University is committed to the free and open exchange of knowledge, including research data. However, there are instances when the premature or unintended release of the data can result&hellip;<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":5286,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/one-column.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-19472","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Research Data Security Classifications - University of Rochester<\/title>\n<meta name=\"description\" content=\"Understand definitions, processes and protocols for working with high-risk, moderate-risk, and low-risk data at the University of Rochester.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rochester.edu\/provost\/university-data\/data-governance-overview\/research-data-security-classifications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Research Data Security Classifications - University of Rochester\" \/>\n<meta property=\"og:description\" content=\"Understand definitions, processes and protocols for working with high-risk, moderate-risk, and low-risk data at the University of Rochester.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rochester.edu\/provost\/university-data\/data-governance-overview\/research-data-security-classifications\/\" \/>\n<meta property=\"og:site_name\" content=\"Office of the Provost\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-16T15:52:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rochester.edu\/provost\/wp-content\/uploads\/2022\/02\/Link-Preview-Provost-1200x630.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rochester.edu\/provost\/university-data\/data-governance-overview\/research-data-security-classifications\/\",\"url\":\"https:\/\/www.rochester.edu\/provost\/university-data\/data-governance-overview\/research-data-security-classifications\/\",\"name\":\"Research Data Security Classifications - University of Rochester\",\"isPartOf\":{\"@id\":\"https:\/\/www.rochester.edu\/provost\/#website\"},\"datePublished\":\"2021-06-20T23:29:32+00:00\",\"dateModified\":\"2023-11-16T15:52:32+00:00\",\"description\":\"Understand definitions, processes and protocols for working with high-risk, moderate-risk, and low-risk data at the University of Rochester.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rochester.edu\/provost\/university-data\/data-governance-overview\/research-data-security-classifications\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rochester.edu\/provost\/university-data\/data-governance-overview\/research-data-security-classifications\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rochester.edu\/provost\/university-data\/data-governance-overview\/research-data-security-classifications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rochester.edu\/provost\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"University Data\",\"item\":\"https:\/\/www.rochester.edu\/provost\/university-data\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Data Governance\",\"item\":\"https:\/\/www.rochester.edu\/provost\/university-data\/data-governance-overview\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Research Data Security Classifications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rochester.edu\/provost\/#website\",\"url\":\"https:\/\/www.rochester.edu\/provost\/\",\"name\":\"Office of the Provost\",\"description\":\"University of Rochester\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rochester.edu\/provost\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Research Data Security Classifications - University of Rochester","description":"Understand definitions, processes and protocols for working with high-risk, moderate-risk, and low-risk data at the University of Rochester.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rochester.edu\/provost\/university-data\/data-governance-overview\/research-data-security-classifications\/","og_locale":"en_US","og_type":"article","og_title":"Research Data Security Classifications - University of Rochester","og_description":"Understand definitions, processes and protocols for working with high-risk, moderate-risk, and low-risk data at the University of Rochester.","og_url":"https:\/\/www.rochester.edu\/provost\/university-data\/data-governance-overview\/research-data-security-classifications\/","og_site_name":"Office of the Provost","article_modified_time":"2023-11-16T15:52:32+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rochester.edu\/provost\/wp-content\/uploads\/2022\/02\/Link-Preview-Provost-1200x630.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rochester.edu\/provost\/university-data\/data-governance-overview\/research-data-security-classifications\/","url":"https:\/\/www.rochester.edu\/provost\/university-data\/data-governance-overview\/research-data-security-classifications\/","name":"Research Data Security Classifications - University of Rochester","isPartOf":{"@id":"https:\/\/www.rochester.edu\/provost\/#website"},"datePublished":"2021-06-20T23:29:32+00:00","dateModified":"2023-11-16T15:52:32+00:00","description":"Understand definitions, processes and protocols for working with high-risk, moderate-risk, and low-risk data at the University of Rochester.","breadcrumb":{"@id":"https:\/\/www.rochester.edu\/provost\/university-data\/data-governance-overview\/research-data-security-classifications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rochester.edu\/provost\/university-data\/data-governance-overview\/research-data-security-classifications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rochester.edu\/provost\/university-data\/data-governance-overview\/research-data-security-classifications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rochester.edu\/provost\/"},{"@type":"ListItem","position":2,"name":"University Data","item":"https:\/\/www.rochester.edu\/provost\/university-data\/"},{"@type":"ListItem","position":3,"name":"Data Governance","item":"https:\/\/www.rochester.edu\/provost\/university-data\/data-governance-overview\/"},{"@type":"ListItem","position":4,"name":"Research Data Security Classifications"}]},{"@type":"WebSite","@id":"https:\/\/www.rochester.edu\/provost\/#website","url":"https:\/\/www.rochester.edu\/provost\/","name":"Office of the Provost","description":"University of Rochester","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rochester.edu\/provost\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.rochester.edu\/provost\/wp-json\/wp\/v2\/pages\/19472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rochester.edu\/provost\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.rochester.edu\/provost\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.rochester.edu\/provost\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rochester.edu\/provost\/wp-json\/wp\/v2\/comments?post=19472"}],"version-history":[{"count":13,"href":"https:\/\/www.rochester.edu\/provost\/wp-json\/wp\/v2\/pages\/19472\/revisions"}],"predecessor-version":[{"id":45632,"href":"https:\/\/www.rochester.edu\/provost\/wp-json\/wp\/v2\/pages\/19472\/revisions\/45632"}],"up":[{"embeddable":true,"href":"https:\/\/www.rochester.edu\/provost\/wp-json\/wp\/v2\/pages\/5286"}],"wp:attachment":[{"href":"https:\/\/www.rochester.edu\/provost\/wp-json\/wp\/v2\/media?parent=19472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}