{"id":1832,"date":"2022-12-09T22:15:10","date_gmt":"2022-12-09T22:15:10","guid":{"rendered":"https:\/\/www.lib.uiowa.edu\/data\/?page_id=1832"},"modified":"2026-02-20T17:36:38","modified_gmt":"2026-02-20T17:36:38","slug":"ui-policies","status":"publish","type":"page","link":"https:\/\/www.lib.uiowa.edu\/data\/ui-policies\/","title":{"rendered":"UI Research Data Policies"},"content":{"rendered":"<p>This table lists UI Policies and Guidance that are applicable to research data across the data lifecycle.<\/p>\n<table class=\"simple-table\">\n<thead>\n<tr>\n<th>Policy Source and Office<\/th>\n<th>Planning for research<\/th>\n<th>During research<\/th>\n<th>Sharing and preserving data &amp; code<\/th>\n<th>Closing a project\/leaving UI<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><a href=\"https:\/\/itsecurity.uiowa.edu\/university-it-policy\/hipaa\" target=\"_blank\" rel=\"noopener\">Privacy Rules and HIPPA at the University of Iowa<\/a><br \/>\n&#8211; IT Security &amp; Policy Office<\/td>\n<td class=\"bg-grey\">Requirement for privacy notices<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/itsecurity.uiowa.edu\/security-policy\" target=\"_blank\" rel=\"noopener\">Policy Roles and Responsibilities<\/a><br \/>\n&#8211; IT Security &amp; Policy Office<\/td>\n<td class=\"bg-grey\">Roles of data steward, data custodian, authorized user<\/td>\n<td><\/td>\n<td class=\"bg-green\">External data sharing guidelines<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/dsp.research.uiowa.edu\/types-contracts-and-model-contracts\/data-sharing-and-use\" target=\"_blank\" rel=\"noopener\">Data Ownership and Transfer<\/a><br \/>\n&#8211; Division of Sponsored Programs<\/td>\n<td class=\"bg-grey\">Considerations for contracted research, terms and conditions in grants<\/td>\n<td><\/td>\n<td class=\"bg-green\">Considerations for contracted research, terms and conditions in grants<\/td>\n<td class=\"bg-orange\">Transfer of data if PI leaves UI<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/itsecurity.uiowa.edu\/institutional-data\" target=\"_blank\" rel=\"noopener\">Institutional Data Policy<\/a><br \/>\n&#8211; IT Security &amp; Policy Office<\/td>\n<td class=\"bg-grey\">Choosing infrastructure and tools for research type<\/td>\n<td class=\"bg-blue\">Restrictions on who, where, and how data may be accessed; data backup requirements<\/td>\n<td><\/td>\n<td class=\"bg-orange\">Disposal of equipment with institutional data<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/itsecurity.uiowa.edu\/managing-university-data\" target=\"_blank\" rel=\"noopener\">Managing University Data<\/a><br \/>\n&#8211; IT Security &amp; Policy Office<\/td>\n<td class=\"bg-grey\">Choosing infrastructure and tools for research type<\/td>\n<td class=\"bg-blue\">UI System Registry requirements<\/td>\n<td class=\"bg-green\">Export controls for technical data<\/td>\n<td class=\"bg-orange\">Policy statements re: disposal\/transfer of equipment with data<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/research.uiowa.edu\/researchers\/policies-and-compliance\/responsible-conduct-research\" target=\"_blank\" rel=\"noopener\">Responsible Conduct of Research<\/a><br \/>\n&#8211; Office of the VP for Research<\/td>\n<td class=\"bg-grey\">Training for students, postdocs, and K-award faculty when planning for research.<\/td>\n<td class=\"bg-blue\">Training for students, postdocs, and K-award faculty during research.<\/td>\n<td class=\"bg-green\">Training for students, postdocs, and K-award faculty when sharing and preserving research data.<\/td>\n<td class=\"bg-orange\">Training for students, postdocs, and K-award faculty when closing a project.<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/dsp.research.uiowa.edu\/types-contracts-and-model-contracts\/data-sharing-and-use\" target=\"_blank\" rel=\"noopener\">Data Management: Research Records<\/a><br \/>\n&#8211; Division of Sponsored Programs<\/td>\n<td><\/td>\n<td class=\"bg-blue\">Considerations for managing data; PI responsibilities<\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/dsp.research.uiowa.edu\/types-contracts-and-model-contracts\/data-sharing-and-use\" target=\"_blank\" rel=\"noopener\">Data Use Agreements<\/a><br \/>\n&#8211; Division of Sponsored Programs<\/td>\n<td><\/td>\n<td class=\"bg-blue\">Gaining access to restricted data from an external source<\/td>\n<td class=\"bg-green\">Sharing restricted access data with an external entity<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/dsp.research.uiowa.edu\/types-contracts-and-model-contracts\/data-sharing-and-use\" target=\"_blank\" rel=\"noopener\">Research Data Policy<\/a><br \/>\n&#8211; Division of Sponsored Programs<\/td>\n<td><\/td>\n<td class=\"bg-blue\">Responsibilities for collection and retention of data<\/td>\n<td class=\"bg-green\">Sharing of data per federal guidelines and IRB<\/td>\n<td class=\"bg-orange\">Transfer of data if PI leaves UI<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/itsecurity.uiowa.edu\/services\/computer-data-and-media-disposal-training\" target=\"_blank\" rel=\"noopener\">Computer Data and Media Disposal<\/a><br \/>\n&#8211; IT Security &amp; Policy Office<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td class=\"bg-orange\">Securely removing data from computers<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>This table lists UI Policies and Guidance that are applicable to research data across the data lifecycle. Policy Source and Office Planning for research During research Sharing and preserving data [&hellip;]<\/p>\n","protected":false},"author":124,"featured_media":0,"parent":0,"menu_order":8,"comment_status":"closed","ping_status":"closed","template":"pagetpl-data.php","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[],"tags":[26,16,14,44,45],"class_list":["post-1832","page","type-page","status-publish","hentry","tag-data-classification","tag-data-sharing","tag-policies","tag-rcr","tag-responsible-conduct-of-research","","data","wp-json","wp","v2","pages","1832"],"_links":{"self":[{"href":"https:\/\/www.lib.uiowa.edu\/data\/wp-json\/wp\/v2\/pages\/1832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lib.uiowa.edu\/data\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.lib.uiowa.edu\/data\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.lib.uiowa.edu\/data\/wp-json\/wp\/v2\/users\/124"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lib.uiowa.edu\/data\/wp-json\/wp\/v2\/comments?post=1832"}],"version-history":[{"count":19,"href":"https:\/\/www.lib.uiowa.edu\/data\/wp-json\/wp\/v2\/pages\/1832\/revisions"}],"predecessor-version":[{"id":3209,"href":"https:\/\/www.lib.uiowa.edu\/data\/wp-json\/wp\/v2\/pages\/1832\/revisions\/3209"}],"wp:attachment":[{"href":"https:\/\/www.lib.uiowa.edu\/data\/wp-json\/wp\/v2\/media?parent=1832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lib.uiowa.edu\/data\/wp-json\/wp\/v2\/categories?post=1832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lib.uiowa.edu\/data\/wp-json\/wp\/v2\/tags?post=1832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}