Information Security in Research

Unauthorized access, breach of confidentiality, loss of integrity, disruption of availability, and other risks threaten your research information and electronic devices. UFIT security policies are aimed at reducing exposure to threats, thereby minimizing risk in order to protect UFIT resources.

 Approved Software:

When considering where or how you are going to store the data for your study, UF Information Technology along with Integrated Risk Management have created a website to search for software applications and their approved uses based on your data type. It can be found at this link:

Fast Path Solutions


Approved Hardware:

Information regarding the use of electronic devices can be found at the following link:

Mobile Computing and Storage Devices policy