Resources
Below are a few BRICCs program resources. This list will continue to grow. Check back frequently!
Workshop Reports
- Landscape Report
- Landscape Report (Slide Format)
- Empowering Institutions: Cyberinfrastructure Insights
- Advancing Cyberinfrastructure Access: Insights and Recommendations
- Bridging Research Computing: Pathways to Smaller Institutions
Reproducibility Resources
- ReproZip can automatically pack your research along with all necessary data files, libraries, environment variables and options into a self-contained bundle.
Data Classification Resources
- The Data Classification Calculator can help determine the appropriate classification for your data. Appropriate data classification is an essential component for the development of a successful data security strategy.
Engagement Resources
- Research Computing Questions
- Funding and Regulations Questions
- Student Engagement and Outreach Questions
- Training Logistics Questions
Education and Training Resources
Texas A&M Information Security Controls Catalog
Campus CI Engagement Reports
- EPOC Materials
- Requirements Review Case Study Template
- Trinity University Campus-Wide Deep Dive
- Arcadia University Bioinformatics Application Deep Dive
- University of Cincinnati Campus-Wide Deep Dive
- Purdue University Application Deep Dive
Sample Policies for Information Resources
The following information is provided courtesy of South Plains College with permission from Dr. James Van Howell, Associate Dean of Information Services.
- IA. Policy Compliance
- IB. User Accounts Management Policy
- IB-A. User Account Credentials Eligibility Statement
- IC. User Account Password
- ID. Acceptable Use
- IE. Virtual Private Network Access Policy
- IF. Data Governance
- IG. Data Classification
- IH. Security Incident Response
- IJ. Change Management
- IK. Digital Encryption
- IL. Data Backup
- IM. Network Use and Vulnerability Assessment
- IN. Technology Security
- IO. Server Administration
- IP. Media Sanitization Policy
- IQ. NDA Requirement Policy
- IR. Risk Assess Policye
- IS. IT Administrator/Special Access
- IT. Authorized Software Policy
- IU. Communication Policy
- IV. Firewall Policy
- IW. Identification/Authentication
- IX. Intrusion Detection Security Monitoring Policy
- IY. Malicious Code
- IZ. Physical Access Policy
- I1. Portable Computing Policy
- I2. Privacy Policy
- I3. Third-Party Access
- I4. Application Security Policy
- I5. Technology Acquisition Oversight
- I6-A. Website Disclaimer
- I7. Merchant Card Policy
BroadbandUSA Digital Inclusion
Video Links
Below are some video links for your reference. This list will continue to grow. Check back frequently!