Research Lifecycle

From preparing your proposal, to reviewing a Data Use Agreement and closing out your research, Information Security is here to help you throughout the research lifecycle with research security. We are typically involved in the following steps of the cycle, but are available to consult at anytime: