1. NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing Policy. March 9 2015. https://osp.nih.gov/wp-content/uploads/NIH_Best Practices for Controlled-Access to the Data Subject to the NIH GDS Policy.pdf. NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing Policy. March 9 2015. https://osp.nih.gov/wp-content/uploads/NIH_Best Practices for Controlled-Access to the Data Subject to the NIH GDS Policy.pdf.
2. UC Berkeley / Information Security and Policy -- A-Z Policy Catalog: Laws and Regulations. See: https://security.berkeley.edu/policy/laws-regulations. UC Berkeley / Information Security and Policy -- A-Z Policy Catalog: Laws and Regulations. See: https://security.berkeley.edu/policy/laws-regulations.
3. UC Berkeley / Information Security and Policy -- Minimum Security Standard for Electronic Information. July 2013. See: https://security.berkeley.edu/minimum-security-standard-electronic-information-effective-july-2013 UC Berkeley / Information Security and Policy -- Minimum Security Standard for Electronic Information. July 2013. See: https://security.berkeley.edu/minimum-security-standard-electronic-information-effective-july-2013
4. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. June 6 2018. See: https://csrc.nist.gov/publications/detail/sp/800-171/rev-1/final Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. June 6 2018. See: https://csrc.nist.gov/publications/detail/sp/800-171/rev-1/final
5. NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. See: https://osp.od.nih.gov/wp-content/uploads/NIH Best Practices for Controlled-Access Data Subject to the NIH GDS Policy.pdf NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. See: https://osp.od.nih.gov/wp-content/uploads/NIH Best Practices for Controlled-Access Data Subject to the NIH GDS Policy.pdf