FEATURESCustomize note-taking with dozens of entry types, widgets and integrationsEnhance productivity, collaboration, and scientific best practiceManage and track all data, contributions and publishing activityEnhance research integrity, ensure compliance, and safeguard intellectual property
Research Data Integrity & Security Center
Your go-to info center for research data security news, tools, and best practices
Awareness. Preparation. Collaboration. Monitor. Learn. Exchange.
A Thought Leader outreach program for Research Integrity teams, Research Administration, IT Security and Researchers.
NIH Data Sharing
Calls for open science have increased in the past decades, with open access publishing becoming more popular, public repositories for code, data, protocols, and software growing rapidly, and the introduction of novel practices such as open peer review and large-scale open-source online education.
For all grant submissions after January 25th, 2023, investigators will have to submit a Data Management and Sharing plan (DMS) that outlines how data, and accompanying metadata, generated as part of the proposal will be shared and managed.
The DMS must include a timeline for data preservation and access as well as where the data will be made available (i.e., the name of the repository where scientific data and metadata will be archived).
For many research groups, this may be a big adjustment and seem overwhelming. Contact us to discuss options or request access to the NIH Data Sharing Plan Notebook
Need help navigating all the abbreviations and acronyms used in the Research Data Management and Security world? Check out our Glossary of Research Data Security Acronyms and Terms!
NSPM – 33
WHAT IS NSPM-33? NSPM-33 is a directive from the President requiring all federal research funding agencies to strengthen and standardize disclosure requirements for federally funded awards. In addition, it also mandates the establishment of research security programs at major institutions receiving federal funds.
WHY IS IT NEEDED? There has been an increasing need to protect U.S-funded scientific research from foreign interference and exploitation, including espionage and intellectual property theft.
LabArchives is the sponsor of the Research Data Integrity & Security Center Advisory Board which is made up of experienced members of Research Integrity, Research Administration, Research, and CIO teams from various research organizations and institutions.
The Advisory board meets virtually every quarter. We will be forming committees and chairs for various topic areas the community has expressed interest in.
Webinars, learning sessions, publications, are available to every registrant.
Expectations of advisory board members:
- Attend (virtually) quarterly meetings to discuss topics.
- Identify known pain points in the process, procedures interpretation of rules and practices.
- Help recruit contributors from the community.
- Help review content (webinar, learning modules, white papers, best practices, etc).
- Work with established organizations in the areas of expertise to ensure collaboration, amplification and community engagement with the express purpose of creating common knowledge and understanding of the issues with regard to research data management, integrity, security and compliance.
Contact us if you are interested in joining the Advisory Board or for any additional information.
Access further information on LabArchives' security processes and standards
Security and Compliance
Learn more about all the security and compliance standards LabArchives' meets including SOC2, ISO 27001, HIPAA, and GDPR.
LabArchives is accessible technology for anyone and meets important standards for assistive technology.
LabArchives Security Features
Learn how LabArchives maximizes the integrity of your research data to improve reproducibility and traceability.
Security Blog Posts
These guiding principles are the embodiment of our commitment to data protection, research integrity, and ensuring strong trust in technology.
In this series, we take a look at the Value of Scale and Scope of cloud computing and the security benefits of centralized SaaS computing.
In Part 2 of this series, we take a look at the Technology Secured at Scale of cloud computing and the security benefits of centralized SaaS computing.
In Part 3 of this series, we take a look at the financial implications of cloud computing and the security benefits of centralized SaaS computing.
The purpose of this document is to outline the key components of the NIH 2023 Data Management and Sharing (DMS) policy
Calls for open science have increased in the past decades, with open access publishing becoming more popular.