Skip to main content
Texas A&M University
Technology Services
  • Secure Technologies for Aggie Researchers
  • STAR System
    • Plan
      • STAR Flyer
      • Division of Research Resources
      • Data Classification Tool
    • Propose
      • Division of Research Systems and Programs
      • Research Proposal Statements for Technology Infrastructure
      • STAR Proposal Statements
      • AWS Pricing Calculator
      • NIH Grants and STRIDES Initiative
      • NIH N3C Data Enclave
      • Data Management Planning
    • Setup
      • Request a STAR Account
      • Data Classification
      • Request a REDCap User Account
    • Manage
      • Research Data Management, Privacy and Compliance Resources
      • Collecting Data
      • Sharing and Analyzing Data
      • Reporting Suspected PHI, PII, HIPAA or Data Breaches
      • Avoiding Data Disasters
    • Closeout
      • Data Sharing
      • Data Archiving
      • TAMUS Applicable Records Retention
  • Getting Started
  • Services
  • Support
  • Training
  • About
  • STAR System

    The STAR System models all the stages and major activities involved in typical research projects.

    Overview of STAR System

    Plan

    • STAR Flyer
    • Division of Research Resources
    • Data Classification Tool

    Propose

    • Division of Research Systems & Programs
    • Research Proposal Statements for Technology Infrastructure
    • STAR Proposal Statements
    • AWS Pricing Calculator
    • NIH Grants & STRIDES Initiative
    • NIH N3C Data Enclave
    • Data Management Planning

    Setup

    • Request a STAR Account
    • Data Classification
    • Request a REDCap User Account

    Manage

    • Research Data Management, Privacy & Compliance Resources
    • Collecting Data
    • Sharing Data
    • Analyzing Data
    • Reporting Suspected PHI, PII, HIPAA or Data Breaches
    • Avoiding Data Disasters

    Closeout

    • Data Sharing
    • Data Archiving
    • TAMUS Applicable Records Retention
  • Home
  • Getting Started
  • Services
  • Support
  • Training
  • About
  • STAR
  • STAR System
  • STAR Proposal Statements

STAR Proposal Statements

STAR Data Protection Statements for IRB Applications (Human Research Application Version 1.4) are available below. When using STAR information resources, you may insert the following statements into IRB applications. Simply copy and paste the text into your proposal.

  • Section 13.4: When selecting "yes" to section 13.4 question: Will the Protected Health Information (PHI) in this study be stored with encryption?, for the "How is PHI transmitted electronically being protected," you may paste the following:

The acquisition of data sets from research partners outside of Texas A&M University is facilitated with Globus, a secure data transfer tool developed by the University of Chicago. Globus uses "data channels" for moving data between endpoints. All transfers are encrypted using an SSL cipher configured on the endpoints with AES256-SHA encryption. Any data that transits between on-premises storage and STAR-AWS cloud storage and compute is encrypted against each applicable protocol.

  • Section 13.4 question "How is PHI data protected?", you may insert the following:

STAR-AWS requires mandatory security configurations for the protection of PHI. All STAR virtual machines and storage repositories are hosted by Amazon AWS with encryption of EC2 virtual compute and S3 storage buckets using preconfigured HIPAA cloud formation templates that fulfill all applicable HIPAA security requirements across access control, monitoring, backups, and all other controls. Supplemental reports and security configuration attestation is available upon request.

  • Section 16.1 Data Management: "Where will the data be stored?", you may paste the following:

STAR-AWS data is stored in the Amazon AWS US East – Northern Virginia availability zone. Data is encrypted in transit when traversing between Amazon AWS and on-premises Texas A&M University data repositories.

  • Section 16.1 Data Management: "If you are storing or transmitting collected data, is the storage and transmission of the data encrypted?"

You may answer "Yes." Technology Services is able to attest to this statement if verification is required.

  • Section 16.2 Data Safety Monitoring Plan: When answered yes, to complete the question of "How is it Managed?"

You may answer: The STAR program, managed by Technology Services, enables security monitoring for intrusion prevention, intrusion detection, and passive access control. The Principal Investigator serves as the data manager, exercising governance over access to the environment by authorizing (or denying) requests for access to datasets. Technology Services serves as the data custodian with responsibility for implementing security controls required by the Texas A&M University Controls Catalog and monitoring the environment.

Resources for the Propose Stage
  • Propose
  • Division of Research Systems and Programs
  • Research Proposal Statements for Technology Infrastructure
  • STAR Proposal Statements
  • AWS Pricing Calculator
  • NIH Grants and STRIDES Initiative
  • NIH N3C Data Enclave
  • Data Management Planning

Help and Feedback

Give us your feedback, make suggestions, and ask questions.

  • Get Help
  • Leave Feedback

Join our Slack Channel

Join the community to discuss TAMU research computing topics

#TAMUSTAR

Texas A&M University
  • Technology Services
  • Site Map
  • Site Policies
  • Accessibility
Back to Top