Search2 Results

Selecting technology to manage a study remotely is a big decision. This article includes considerations for selecting technology and information on vendors that are (at the time of writing) approved for use in research at U-M.
Information security is an important aspect of any study utilizing mobile technologies because these studies require data to be transferred from a 3rd party into the university computing environment. Transferring data through the firewall creates vulnerabilities that need to be managed appropriately. This article provides information and resources for investigators that will help them navigate the complex and ever-changing landscape of data security at Michigan.