IT/SECURITY
Our IT team provides secure hosting of sensitive, clinical and other data.
Enhanced logical and physical security measures are implemented to safeguard the equipment and the data within it. These security measures are enforced 24 hours a day, 7 days a week, 365 days a year by a combination of on-premises security guards, University police officers, and video surveillance.
The Utah DCC coordinates the network infrastructure and security with University Information Technology (UIT) at the University of Utah. This provides us with robust firewall hardware, automatic network intrusion detection, and the expertise of dedicated security experts working at the University.
Other IT services include:
- Comprehensive controls in place to safeguard our servers and application logs from unauthorized access, modification, or deletion
- Data encrypted at rest and during transit
- Resources that have been formally trained and appointed by the federal government to fulfill the role of an Information Systems Security Officer (ISSO) to safeguard the integrity, confidentiality, and availability of government information systems
- Comprehensive backup and recovery mechanisms in place to recover data in case of accidental deletion or a disaster scenario. Our virtual, tape, and disk backups are encrypted and stored securely (onsite and offsite) to prevent unauthorized access or modification.
- Skilled development of custom software solutions, specifically designed to cater to the needs of clinical research
- Creation of intuitive, secure, and modern applications that effectively handle the complexity and scale of collected data
- Deep expertise in the design and development of web services using HTTP, XML, SOAL, WSDL, and REST protocols to allow for consumption and collection of data over the internet
- Website development capabilities focused on constructing efficient and user-friendly websites. Our methods are guided by a comprehensive understanding of user experience (UX) principles, allowing us to create intuitive and user-centric interfaces.