Secure Computing Environment

What Is It?

The Secure Computing Environment is a secure environment that mitigates the risks of working with electronic personal health information and other types of high-risk data. The SCE eases the burden on the researcher of having to configure and ensure that their computational work environment has been configured with the appropriate security controls and to minimize the risk of exposing high-risk data. The SCE makes it easier for researchers to implement necessary safeguards that is subject to regulatory or compliance requirements, including but not limited to, HIPAA, FISMA, Personal Information Protection Act of Illinois and other grant-specific regulations.

Features

  • Technology Solutions only provides the secure computing platform but the user acts as the data custodian for their sensitive data
  • The requestor must read and adhere to the SCE Acceptable Use Policy (AUP) mentioned here 
  • Technology Solutions will not provide admin-level access to users
  • Any changes to our policy should be requested through sce@uic.edu

Requirements

Who Is Eligible To Use It?

  • Faculty

Where Can I Get It?

Select the Request SCE Virtual Machine button located on this page.

How Do I Use It?

Learn what is a Secure Computing Environment and how to use it.

How Much Does It Cost?

The costs associated with this service vary depending upon the configuration of the VM. Review What are the different cost options for the Secure Computing Environment? for current pricing information.

How Can I Get Support?

If you are experiencing a problem with this service, please report it. If you just have a question, feel free to ask us.

Service Levels

Service Request Fulfillment Time 8 business days
Incident Resolution Time 2 business days
Service Availability Available 24x7 except for weekly maintenance window on Monday from 3:00am to 4:00am
Maintenance Window(s) Approved Technology Solutions maintenance window(s)
Service Notification Channel(s) IT Service Notices
 
Request SCE Virtual Machine

Related Articles (2)

The different monthly cost options based on CPU and memory configurations are listed below.
ePHI (electronic personal health information) and other types of high-risk data requires the need for the Secure Computing Environment (SCE).