Tools for researchers

If you are a researcher and you need a cloud service to support or enable your research, you must follow the Cloud Service Acquisition process.

As a researcher, you are responsible to assess cloud solutions from a compliance and risk perspective. In addition, researchers are identified as the Data Trustees for research data. This means that you perform the concept approval (step 2), the IT risk assessment (step 4), and the contract assessment (step 5) yourself. If you require assistance to perform this due diligence you may request support.

Questions related to Contact Contact details
General questions Digital Research Services drs [at]
IT Risk assessment IT Services For assessment support, complete the Software or Cloud Service Acquisition form (replaces the Security assessment for research form)
Contract assessment Procurement Services Procurement Service Desk

More resources will become available to you in the coming months.


Intro for researchers to
Cloud Service Acquisition Process

Researchers perform their own assessment when acquiring Cloud Services. Read more to learn how.


Software or Cloud Service Acquisition

This form replaces the Security assessment for research form
If you are a researcher you can complete this form to request a security assessment or consultation session on a technology/software for research purposes.


sessions for research

Researchers can visit the link above to register for scheduled drop-in sessions about data collection, storage, privacy and security. Representatives from all support teams (Research Ethics, Libraries, VPRI, and IT Services) will be present to address questions and discuss concerns.



Back to top