What Is It?
The Secure Computing Environment is a secure environment that mitigates the risks of working with electronic personal health information and other types of high-risk data. The SCE eases the burden on the researcher of having to configure and ensure that their computational work environment has been configured with the appropriate security controls and to minimize the risk of exposing high-risk data. The SCE makes it easier for researchers to implement necessary safeguards that is subject to regulatory or compliance requirements, including but not limited to, HIPAA, FISMA, Personal Information Protection Act of Illinois and other grant-specific regulations.
Features
- Technology Solutions only provides the secure computing platform but the user acts as the data custodian for their sensitive data
- The requestor must read and adhere to the SCE Acceptable Use Policy (AUP) mentioned here
- Technology Solutions will not provide admin-level access to users
- Any changes to our policy should be requested through sce@uic.edu
Requirements
Who Is Eligible To Use It?
Where Can I Get It?
Select the Request SCE Virtual Machine button located on this page.
How Do I Use It?
Learn what is a Secure Computing Environment and how to use it.
How Much Does It Cost?
The costs associated with this service vary depending upon the configuration of the VM. Review What are the different cost options for the Secure Computing Environment? for current pricing information.
How Can I Get Support?
If you are experiencing a problem with this service, please report it. If you just have a question, feel free to ask us.
Service Levels
Service Request Fulfillment Time |
8 business days |
Incident Resolution Time |
2 business days |
Service Availability |
Available 24x7 except for weekly maintenance window on Monday from 3:00am to 4:00am |
Maintenance Window(s) |
Approved Technology Solutions maintenance window(s) |
Service Notification Channel(s) |
IT Service Notices |