-
Office of Research Administration
- About
- Pre-Award
- Post-Award
- Policies and Guidelines
- Research Compliance
- Human Subjects Research
- Animal Research
- Conflict of Interest
- Responsible Conduct of Research
- Research Misconduct
- Research Security
- Information Technology Resources
- CITI Training
- Technology Control Plan (TCP)
- Research Security Program Committee
- NSPM-33 Overview
- State of Maryland Ethics and Financial Disclosure
- Diversity and EEO
- Drug Alcohol and Tobacco Policies
- Trainings
- Resources
- Funding Sources
- Events
Office of Research Administration
Research Security Information Technology Resources
Morgan State University is committed to maintaining the security, integrity, and availability of its information assets. To support this mission, the university has developed a series of standards and procedures that align with industry best practices and regulatory requirements. These documents provide guidance on how we manage cybersecurity risks, respond to incidents, and protect sensitive information.
Information Security Incident Response Standard & Procedure
The Information Security Incident Response Standard & Procedure provides Morgan State University with a structured framework for identifying, managing, and responding to information security incidents. Its primary goal is to minimize the potential impact on the university’s information assets while ensuring the confidentiality, integrity, and availability of critical systems and data.
Information Security Risk Management Standard & Procedure
The Information Security Risk Management Standard & Procedure establishes a formal process for identifying, assessing, and managing risks to Morgan State University’s information systems. It defines the methodologies necessary to evaluate risks, implement mitigation strategies, and ensure the ongoing protection of information assets. This procedure aligns with national and international frameworks, including NIST SP 800-37, NIST SP 800-53, ISO 27005, and ISO 31000, to support a consistent, standards-based approach to information security risk management.
Data Encryption Procedure
The Data Encryption Procedure ensures that Morgan State University’s sensitive and confidential information is protected through the implementation of strong encryption practices. As a critical security measure, encryption safeguards data from unauthorized access by rendering it unreadable without the appropriate decryption credentials.
Data Classification Procedure
The Data Classification Procedure establishes a structured framework for categorizing, managing, and protecting Morgan State University data based on its sensitivity and the risks associated with unauthorized access or disclosure. Proper classification enables the implementation of appropriate security controls and safeguards, helping to prevent data breaches, loss, or misuse, and ensuring compliance with legal, regulatory, and institutional requirements.
-
Office of Research Administration
- About
- Pre-Award
- Post-Award
- Policies and Guidelines
- Research Compliance
- Human Subjects Research
- Animal Research
- Conflict of Interest
- Responsible Conduct of Research
- Research Misconduct
- Research Security
- Information Technology Resources
- CITI Training
- Technology Control Plan (TCP)
- Research Security Program Committee
- NSPM-33 Overview
- State of Maryland Ethics and Financial Disclosure
- Diversity and EEO
- Drug Alcohol and Tobacco Policies
- Trainings
- Resources
- Funding Sources
- Events
Contact Information
Office of Research Administration
Morgan State University
Tyler Hall, Student Service Bldg
Suite 304
Baltimore, MD 21251
Questions, contact:
P: 443-885-4044
F: 443-885-8280
E: ask.ora@morgan.edu
Contact Information
Office of Research Administration
Morgan State University
Tyler Hall, Student Service Bldg
Suite 304
Baltimore, MD 21251
Questions, contact:
P: 443-885-4044
F: 443-885-8280
E: ask.ora@morgan.edu