Data Security and Backup

university.shield.large.blue  Services from IT@JH

Information Technology @ Johns Hopkins (IT@JH) offers a variety of virtual computing, storage, back-up and web hosting services for JHU researchers. Contact them directly or through the departmental IT representatives.

university.shield.large.blue  Whiting Information Technology

For projects requiring new storage, network, or collaboration solutions, WSE IT offers guidance on available resources and options for Whiting School of Engineering. Contact them directly or through the departmental IT representatives.

university.shield.large.blue  Krieger Information Technology

For projects requiring new storage, network, or collaboration solutions, KIT offers guidance on available resources and options for Krieger school departments. Contact them directly or through the departmental IT representatives.

university.shield.large.blue  JHU Information Security Institute (JHUISI)

JHUISI is JHU’s focal point for research and education in information security, assurance and privacy. It offers graduate degree program and online program for students who are interested in information security. Faculty’s research focus on two major areas: Cryptography and privacy, and Health and medical security.

university.shield.large.blue  JHU Privacy Office

JHU Privacy Office assists JHU researchers who work with PHI data to comply with state and federal health care privacy laws, including HIPAA. This website provides forms, policies, procedures, guidance and other information related to protecting patient’s privacy. In addition, a data breach event should be reported to JHU Privacy Office for review.

university.shield.large.blue  Security Checklist for Research Datasets

JHU Information Security has developed a Security Checklist for Research Datasets. This checklist, while not exhaustive, covers essential security controls for research datasets containing E-PHI (electronic protected health information).

external-link-xxl  HIPAA Security Rule

The HIPAA Security Rule establishes national standards to protect individuals’ electronic personal health information that is created, received, used, or maintained by a covered entity. Summary of the HIPAA Security Rule is available here and a combined text rules can be found here.