Areas Related to Research Security
The Research Security Program engages and collaborates with multiple offices at University of Arkansas to protect the University and its researchers.
Conflicts-of-Interest (COI) Disclosure Information
As outlined in NSPM-33, COI Disclosures are vital to research security.
For additional information regarding University of Arkansas COI disclosure requirements, please refer to Conflicts of Interest/Commitment webpage.
Export Controls
Export Controls is an important factor in securing University of Arkansas’ research enterprise. The Research Security Program engages the Office of Export Control to ensure University of Arkansas and its researchers are compliant with federal export control laws and regulations.
For additional information regarding Export Control-related resources and topics, please refer to the Export Controls webpage.
International Travel Security
The Research Security Program wants to help ensure that such travel abroad is safe and productive.
Visitors to University of Arkansas
Collaboration with both international and domestic colleagues is a critical component of information sharing in an effort to advance education, research, science and technology here at University of Arkansas
Physical Security
In a university research environment, physical security involves protecting assets, personnel, and sensitive data from unauthorized access, theft, or damage through measures like access control, surveillance, and incident response planning.
Access Control:
- Restricting Access:
Implement measures to control who can enter specific areas, such as labs, data centers, and research buildings. - Identification and Authentication:
Utilize ID badges, biometric systems, or other methods to verify authorized personnel. - Locking and Security:
Ensure doors, windows, and other entry points are secure with robust locks and security systems. - Surveillance cameras:
Employ CCTV cameras and other surveillance technologies to monitor activity and deter unauthorized access.
Perimeter Security:
- Fencing and Barriers:
Consider fencing or other physical barriers to deter unauthorized entry to the perimeter of research facilities. - Intrusion Detection:
Use motion sensors, alarms, and other intrusion detection systems to alert security personnel to potential threats.
Internal Security:
- Emergency Response:
Develop and regularly practice emergency response plans for various scenarios, such as fires, security breaches, or natural disasters. - Staff Training:
Ensure that all personnel are trained on security procedures and protocols. - Incident Response:
Establish clear procedures for responding to security incidents, including investigation, reporting, and containment. - Environmental Controls:
Implement measures to protect assets from environmental hazards, such as fire, water damage, and power outages.
Data Security:
- Physical Security of Data:
Protect hard copy data and devices with secure storage and access control measures. - Data Backup and Recovery:
Implement robust data backup and recovery systems to ensure data integrity and availability in case of a security incident. - Secure Storage of Data:
Store sensitive data in secure locations with restricted access.
Relevant Institution Policies Related to Research Security
As an institution, the University of Arkansas is prioritizing efforts to protect its programs and researchers.