Page Menu

REDCap Security Best Practices


REDCap Logo

Never Dismiss a Concern Regarding Security

While the REDCap environment controls implemented by Information Technology keep your studies and data safe, we ask that all REDCap users take an active role to insure that we continue to maintain our high level of security.

security imageYour Responsibilities to Insure Safety and Security 

Your Workstation Security Requirements

REDCap Environment Controls Implemented by IT 

  • Data storage resides in a Regulated Environment
  • IT REDCap System Administrators access through SSL, VPN, signing at entry point
  • Daily automated data backup and storage
  • Centralized regulatory/compliance management