Regulated Environments & Data Protection

GW Information Technology offers regulated environments and data protection, along with risk assessments. 

Request Technology Services

View the Research Guide from GW Libraries for information on Data Management Plans, best practices, archiving data, data security and data use agreements. 

Data management refers to activities and practices that support the long-term preservation, access, and use of data.

Activities can include:

  • planning
  • documenting 
  • formatting 
  • storing 
  • anonymizing
  • setting access restrictions on data.

Federal funding agencies and government entities may require data to be made available after the completion of a funded research project. These agencies may also require transparency of project operations, which means that data management plans must be outlined, submitted, and approved during the initial proposal process for every research project.

GW IT Information Security and Compliance Services team is responsible for establishing and maintaining policies and conducting risk assessments to ensure that George Washington University has a secure information technology environment. GW departments and projects can request or be asked to undergo a risk assessment for their information resources. These formal risk assessments may be conducted in a variety of ways, including:

  • Application Security Assessments or Penetration Testing
  • 3rd Party Application Security Assessments
  • Vulnerability Scans
  • Business Impact Analysis

$6,600 per instance