CoE Cybersecurity and Data Security Reference Terms and Process Guide

This guide outlines the resources for identifying cybersecurity and data security requirements within the College of Engineering (CoE). Designed for Research Administrators (RAs) and Principal Investigators (PIs), it offers a structured approach to detecting security obligations early in the grant lifecycle - specifically during the review of RFPs, NOAs, and contracts. Additionally, the guide details the step-by-step engagement with Computer-Aided Engineering (CAE) to ensure research plans align with federal and sponsor-imposed standards.

In this document:

  • Cybersecurity and Data Security Terms
  • Process Guide: How and when to contact CAE
  • Frequently Asked Questions

Cybersecurity and Data Security Terms

Category Terms
Federal Cybersecurity Requirements
  • NIST SP 800-171
  • CUI
  • DFARS 252.204-7012/-7019/-7020/-7021
  • CMMC
  • FedRAMP
  • SPRS/SPRS Score
Sensitive Data & Handling Requirements
  • CUI, FCI, ITAR
  • PII / Sensitive PII
  • Sponsor-furnished data
  • Encryption requirements
Security Language
  • Secure enclave
  • Restricted data environment 
  • Gov-approved cloud providers only
System, Access, & Audit Requirements
  • Access/audit logs
  • Incident reporting windows
  • Pen testing/vuln scans
  • Control verification
Publication & Dissemination Restrictions
  • Publication restrictions
  • Approval before sharing results
  • Limits on dissemination
Security Requirements for Subawardees and Vendors
  • Flow-down clauses
  • Requirements for subcontractors
  • Sponsor approval of cloud vendors
Specialized Security Infrastructure Requirements
  • High-assurance environment
  • Isolated network
  • Sponsor-approved encryption

Process Guide: When and How to Contact CAE

Step-by-Step Process for Research Administrators

  1. Identify Potential Security Requirements 
    Review RFPs, NOAs, and contracts for:
    • Cybersecurity requirements (e.g., NIST 800-171, CUI, DFARS)
    • Data protection clauses
    • Restricted research or publication controls  
      If anything seems unclear or security-related, proceed to Step 2.

  2. Contact CAE Early
    Email compliance@engr.wisc.edu as soon as possible.

  3. Prepare the Required Documentation 
    Attach or include:
    • Any sponsor-provided language referencing security or data restrictions
    • Relevant sections from the RFP, NOA or contract
    • A brief description of the project (1-2 sentences)

  4. Include Key Details 
    In your email make sure the message includes: 
    • Name of PI Sponsor and program information
    • Deadline or expected timeline
    • Request for CAE assessment of requirements

  5. Notify the PI

Step-by-Step Process for Principal Investigators

  1. Respond Promptly When Notified
    If your Research Administrator flags cybersecurity requirements, understand that a compliance review request is needed for proposal accuracy and award acceptance.

  2. Complete the CAE Compliance Review Request Form
    Fill out the CAE Compliance Review Request Form as soon as as possible.
    Include details about:
    • Data types expected
    • How and where you plan to store or use the data
    • Any sponsor-imposed timelines
  1. Follow-Up Correspondence and Meetings
    You may need to provide additional information to CAE or be available for meetings with CAE to ensure your research plan aligns with required security controls.
  1. Update Proposal Materials Based on CAE Guidance
    If CAE recommends specific environments, tools, or language:
    • Adjust proposal narratives, budgets, or data management plans as needed
    • Coordinate with your Research Administrator to ensure requirements are accurately reflected

Frequently Asked Questions

How soon should CAE be contacted?
Preferably during the proposal stage, if possible.

What information and documentation are needed upon initial contact?
Any documentation provided by the sponsor indicating security requirements.

Who should contact CAE?
Research Administrators should initially reach out to CAE with any supporting documentation by sending an email to: compliance@engr.wisc.edu
Include the name of PI upon sending and ask PI to complete the CAE Compliance Review Request Form.



Keywords:
CoE Cybersecurity and Data Security Quick Reference Terms and Process Guide 
Doc ID:
158290
Owned by:
Sara T. in CAE
Created:
2026-02-04
Updated:
2026-02-10
Sites:
Computer-Aided Engineering