Skip to main content Skip to navigation

Data security requirements

Allocate funds for data security in research proposals

Sponsors are imposing increasingly stringent requirements to ensure the security of project data and the information technology (IT) systems used in their funded projects. These requirements most often appear in federal government contracts. The cost of meeting them can be significant.

Importance of anticipating data security costs

If not budgeted as part of the original proposal, sponsor security requirements may result in either of the following:

  • Award being turned down outright
  • Unwelcome cost-sharing commitment

To avoid these situations, please review any RFP you are working on for language that refers to specific laws, regulations, security frameworks and/or security standards.

If you suspect that any such law, regulation, or sponsor policy will apply to your award, do not submit your proposal until you have consulted with the ORSO contracts manager.

Only submit once you are certain that your unit can comply with the security standards that may be imposed by the sponsor or you have requested sufficient funding in your budget to account for the cost of compliance.

Who to contact for help

If you come across terms related to specific laws, regulations, security frameworks/standards, please contact:

Jessica Smith-Kaprosy, J.D.
Contracts manager, WSU Office of Research Support and Operations (ORSO)
j.smith-kaprosy@wsu.edu
509-335-5447

Jessica will coordinate efforts between ORSO, your unit, the appropriate WSU information security professional, and potentially the sponsor.

Partial list of data security laws and regulations

A non-comprehensive list of relevant laws and regulations is supplied below. In addition, sponsors may have their own security requirements that are unrelated to law or regulation.

Laws, regulations, executive orders and programs

National Institute of Standards and Technology publications

Federal Acquisition Regulations (FAR)

52.204-21, Basic Safeguarding of Covered Contractor Information Systems

Defense Federal Acquisition Regulations Supplement (DFARS)

Health and Human Services Acquisition Regulation (HHSAR)

352.239-70 through 352.239-73, Standard for Security Configurations, Standard for Encryption Language, Security Requirements for Federal Information Technology Resources, Electronic and Information Technology Accessibility (pdf)