Description
The Research Computing Environment (RCE) provides a NIST 800-171: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations compliant computing environment to OHIO researchers that are working with Controlled Unclassified Information (CUI).
Who can access
- OHIO Faculty and Staff conducting research that requires a secure environment to create, manage, and protect CUI data.
How to request access
Features
- Research computing environment that meets NIST 800-171 regulations
Additional resources
Join the Research Computing Advisory Community
-
The Research Computing Advisory Community is open to OHIO students, faculty, and staff who have an interest in advancing Ohio University’s research initiatives through service offerings designed to support Principal Investigators and their corresponding data.
Get help
- Visit the Technology Help Center (help.ohio.edu) to get live support, view outages, and browse trainings.
Accessibility
Ohio University strives to make its digital resources and services accessible to all visitors, including those with disabilities who may also be using assistive technology. If special steps are necessary in order to improve the accessibility of experiences for end-users, those steps must be taken.
If you experience a barrier that affects your ability to access OHIO websites, videos, online forums, documents, or other information technology, please let us know.
For further information about OHIO's digital accessibility resources, see:
Security
The Ohio University Information Security Office strives to educate and empower the University community to appropriately manage risks and protect OHIO’s information and systems. This effort is facilitated through policies, standards, and information security risk management program, as well as other tools and guidance that are provided to the University community. This modern approach creates a safe computing environment in which the University community can teach, learn, and conduct research.
For additional information about OHIO’s security resources, see: