Work with CHRR to create secure research tools for your unique data needs

Work with CHRR to create secure research tools for your unique data needs

As a researcher, making plans to manage your data — and executing on those plans — is a key part of your work. Data management can be tricky, especially when you’re balancing factors such as security, federal compliance, and managed access for your team.

CHRR offers customizable and highly secure research tools that meet your unique data needs — through our data repository and enclave solutions. You can trust that your data is in good hands; CHRR’s expertise runs deep, with more than 60 years of experience storing data, managing researcher access, and keeping sensitive information secure with the latest technologies and protocols.

Our data repository is the best solution for most research projects that need specialized research tools. Sometimes, however, a higher level of security is needed, which can be accomplished with our data enclave. In addition to protecting the data, CHRR is well-positioned to implement and enforce data access processes such as Institutional Review Board (IRB) approval, user agreements, and data security plans. 

Man looking at data on his computer

Meet federal data rules with confidence — even for sensitive data

New federal rules around data management and public access to data have taken center stage recently. If you’re pursuing federal funding for your research, meeting the federal requirements can be challenging, especially with sensitive data that must stay secure. CHRR’s data repository is uniquely suited to help you meet federal rules — configured to offer full public discoverability of metadata while controlling access to the underlying data itself.

CHRR staffer and client collaborating, with data on a computer next to them

Get help creating custom tools for complex data projects 

If your research project involves large amounts of data or a complex data management plan, CHRR can help you build a tool that meets your goals — and doesn’t get in the way of your work. CHRR’s data repository solution can be tailored to meet your unique needs, with solutions such as custom data views, storage, tag taxonomy, and access control. And, as always, CHRR offers peace of mind that your data is safe, with more than 60 years of experience in the data security field.

Contact us today to explore how we can help with your research & data needs.

Trust your data to an industry security leader

For more than 60 years, CHRR has been on the leading edge of information security. The bar was set high in 1965 when CHRR was awarded a U.S. Department of Labor contract for a large, novel survey initiative now known as the National Longitudinal Surveys (NLS). CHRR continues to partner on this initiative and serves as the data administrator, meeting rigorous federal security requirements. 

The center's systems are protected by Next-Generation Firewalls (NGFW), an Endpoint Detection and Response (EDR) solution, and follow a Zero Trust Architecture (ZTA). All data in the environment is encrypted in transit and at rest, and access controls are in place across the information system. Critical information is backed up regularly to a secure off-site location. CHRR's security program also continually evolves to maintain strict alignment with federal standards, such as HIPAA and the National Institute of Standards and Technology (NIST) 800-53 guidelines.

Animation represernting data security showing a server, a lock, a magnifying glass focused on bar chart data and a shield

The sweet spot: A repository that's as “open” as you need — but also as secure as the data demands

Open data that’s also secure can seem like an oxymoron. But CHRR’s data repository solution offers ways to make data publicly discoverable and accessible without compromising the security of the data itself. CHRR creates a Digital Object Identifier (DOI) for the dataset, along with easily searchable metadata. The public also can request access to the data via an easy-to-navigate interface. This triggers a process that incorporates any needed conditions for access such as Data Usage Agreements (DUAs) or data security plans. When access is granted, data can be shared through one of several methods based on data sensitivity.

CHRR’s repository solution uses CKAN open-source data software as its foundation, with significant customizations added to the base software to meet the needs of today's researchers. 
 

Repository example interfaces

Example repository interfaces

What's a better fit? A CHRR repository or enclave?

CHRR’s data repository is typically a good solution for most research projects that come through our doors. However, sometimes an enclave is the best choice, usually when an even higher level of security is needed. 

Here’s a simple explanation of each CHRR service and a feature comparison —

CHRR data repository: 

What is it? A research and data storage tool for sensitive, large, or complex data projects. 

Why you might need it: Some researchers may need to use CHRR’s data repository to meet federal standards for public access to data while keeping the data secure. Others may need the repository for research projects that involve large amounts of data or a complex data management plan. 

CHRR's repository solution can meet a variety of unique needs, such as custom storage solutions, permission schemes, authentication processes, and data pipelines.

CHRR data enclave: 

What is it? A research and data storage tool that offers an additional layer of protection from unauthorized access. The enclave is a controlled, virtual environment on our highly secure network that allows users to access data but not remove it. Researchers must always use the enclave to access the data, and they do their analysis within the virtual space.

Why you might need it: Some data is so sensitive that it needs the strongest protections (for example: personally identifiable information, also known as PII). CHRR’s enclave solution is iron-clad, and even better, it's customizable so that you can use your research tools within the enclave. 

FeaturesStand-Alone Data RepositoryStand-Alone Data EnclaveCombined Repository & Enclave
FindableX X
AccessibleXXX
InteroperableXXX
ReusableXXX
DOI is attachedX X
Data is available via an APIX  
Data can be protected by access controlsXXX
Data is ensured to remain in a secure boundary
 XX
Technical security protections are in place to prevent data exfiltration  XX
Multifactor authentication is supported for data accessXXX
Data is stored in an NIST 800-53, NIST 800-171, OSU ISCR 54, & HIPAA security compliant environment
XXX

Contact us today to explore how we can help with your research & data needs.