CaRCC Capabilities Model Capabilities by Facing
This document includes the main text for the capabilities in each Facing, grouped by topic.[1] This is intended for use by institutions that are discussing who may contribute to an assessment using the Research Computing and Data (RCD) Capabilities Model, and want to share the type of questions that will be asked for each capability.
The CaRCC Capabilities Model is organized into sections that reflect different roles that staff fill in supporting Research Computing and Data, and are named to reflect who or what role is “facing” (i.e., focused on). Within each facing, the model includes capabilities covering aspects of research computing and data for the associated role; the capabilities are grouped into Topics.
Larger organizations may have a team associated with each facing role, while smaller organizations may have just a few people who cover these different roles. In filling out the assessment tool, you will likely want to involve people who work in the different roles; they can work to fill out their respective section of the assessment.
Table 1 presents an introduction to the Facings, and links to the associated capabilities below.
Facing Area |
Description |
Example roles |
|---|---|---|
Includes research computing and data staffing, outreach, and advanced support, as well as support in the management of the research lifecycle. |
Research IT User Support, Research Facilitators, CI engineers[2], etc. |
|
|
Includes data creation; data discovery and collection; data analysis and visualization; research data curation, storage, backup, and transfer; and research data policy compliance. |
Research Data Management specialists, Data Librarians, Data Scientists, etc. |
|
|
Includes software package management, research software development, research software optimization or troubleshooting, workflow engineering, containers and cloud computing, securing access to software, and software associated with physical specimens. |
Research Software Engineers, Applications Specialist, Research Computing support, etc. |
|
|
Includes infrastructure systems, systems operations, and systems security and compliance. |
HPC systems engineers, Storage Engineers, Network specialists, etc. |
|
|
Includes institutional alignment, culture for research support, funding, and partnerships and engagement with external communities. |
Research IT leadership: Director, Assistant/Associate Director, etc. |
Table 1 - Description and examples for the Five Facings
Copyright © 2023-2026 Internet2 and CaRCC, and licensed for use under Creative Commons Attribution-NoDerivatives 4.0 International (CC BY-ND 4.0) which grants usage to the general public and rights to share and redistribute for any purpose, even commercially; you must give appropriate credit with a link to the license, and if you remix, transform, or build upon the materials in any way, you may not distribute the modified material.
[1]This is a supplement to the CaRCC Capabilities Model Introduction and Guide to Use.
[2]“CI Engineers” have different roles at different institutions, and some might (also) be in the Systems Facing roles.
Researcher-Facing Topics and Associated Capabilities
Research Computing and Data Staffing
- Do researchers have access to introductory user support and training related to the use of research computing and data resources available at local, regional, and national level?
That is, are there researcher-facing engagement and support staff who provide this? This often includes staff (and, at some institutions, students) who have the role of training and consulting on basic use of resources. This may include a combination of Research Computing and Data staff, Data Librarians, and staff in partner organizations. It will generally include training and support materials (documentation, recorded webinars and/or presentations, etc.). - Are researcher-facing staff provided with professional development and networking opportunities?
- Do researcher-facing staff have the skills and capacity to broadly support researchers across levels (graduate students to PIs) and across domains with information about the use and effectiveness of new technologies?
- Can researcher-facing staff effectively serve as advocates for the research community to leadership and IT governance?
- To what extent is there a clear vision, effective guidance, and strategy for the allocation and prioritization of support resources/personnel?
Research Computing and Data Outreach (Initial Contact)
- Is there an institutional practice to proactively reach out to researchers, new faculty, or prospective faculty to explain research support services and help with computing beyond the desktop?
For example, this could happen during discussions with prospective faculty or graduate students, or as part of the onboarding or orientation for new researchers. - Do researcher-facing staff have the skills and capacity to effectively engage in community outreach and broader impacts?
- Are researchers made aware of research computing and data related resources?
i. intra-campus resources (e.g., support, training, engineering, central IT services, library services, related centers or institutes) ii. cross-institution, regional, national, and/or international entities that comprise the larger ecosystem of Research Computing and Data (e.g., ACI-REF, Campus Champions, Research Software Engineers, CASC, CaRCC, CI Engineers, PEARC)? - Does your institution have a process to assess researcher awareness, satisfaction, and engagement related to Research Computing and Data services and support?
This might include periodic satisfaction surveys, or another assessment mechanism. - Does your institution have a process to assess the impact of research computing and data support?
This often includes things like publications, grants, etc. for active users, as well as faculty and graduate student recruitment and retention cases supported. It may include profiles of and quotes from active research users. - Does your institution have marketing/communication resources (staff) with the skills and capacity to help publicize and explain research support services?
Research Computing and Data Advanced Support
- Do researchers have access to application support (training, help) for standard software packages, middleware, libraries, and modules?
- Do researcher-facing staff have the skills and capacity to diagnose inefficiencies, monitor usage, and advise on policies and optimizations to make for more efficient utilization of research computing and data resources?
- Are researcher-facing staff engaged with exploring, testing, and deploying emerging or advanced technologies to help research?
- Do researcher-facing staff regularly and effectively document processes, policies, and resources both internally and for the user community?
Research Computing Management of the Research Lifecycle
- Are researchers supported across the full research lifecycle?
I.e., are researchers supported during proposal development, during the active award, and post funding? This may include support for project planning and proposal development, as well as providing research computing and data services. - Do researchers have access to advice on research compute and data compliance, security, management, and governance?
Data-Facing Topics and Associated Capabilities
Data Creation
- Do researchers have access to consulting or other resources on data lifecycle requirements during data creation?
For example, consulting, websites, hand-outs, or other resources providing support to anticipate requirements for metadata, storage, and reuse; publisher requirements; and/or funder requirements. - Do researchers have access to consulting or other resources supporting data discovery?
I.e., consulting, websites, hand-outs, or other resources to help identify appropriate data repositories (on campus, in domains, and more generally). Note: this may come from Research Computing and Data staff, library staff, or other partners.
Data Discovery and Collection
- Do researchers have access to expertise about common Terms of Service for frequently crawled websites/data repositories and best practices guidance?
Examples of this can include:- Are there library or other staff with knowledge about common Terms of Service for frequently crawled websites/data repositories and best practices guidance?
- Are there library or other staff with skills and capacity to inform policies and educate researchers on data use agreements (DUAs)?
- Do researchers have access to software supporting data collection?
For example, do they have access to software for data crawling, for web-scraping, for data-gathering, and similar activities to collect data? - Do researchers have access to resources (e.g., staff) to develop software supporting data discovery and collection?
For example, do they have access to software developers to develop software for:- data collection (including web crawling/scraping/etc.).
- user interfaces or web applications to collect and interact with data with appropriate security protocols and policies.
Data Analysis
- Do researchers have access to consulting, expertise, or other resources on data wrangling/manipulation and data analysis?
- Do researchers have access to software that supports data wrangling/manipulation and data analysis?
- Do researchers have access to dedicated resources (e.g., staff) who can perform data wrangling/manipulation and data analysis?
- Do researchers have access to resources (e.g., staff) for software development of tools that support data wrangling/manipulation and data analysis?
Data Visualization
- Do researchers have access to consulting, expertise, or other resources on data visualization?
- Do researchers have access to software that supports data visualization?
- Do researchers have access to dedicated resources (e.g., staff) who can perform data visualization?
- Do researchers have access to resources (e.g., staff) for software development of tools that support data visualization?
Research Data Curation, Storage, Backup, and Transfer
- Do researchers have access to consulting, expertise, or other resources to help them identify appropriate data repositories (on campus, in domains, and more generally) to place their data?
- Do researchers have access to resources (e.g., staff) who can advise and assist with database creation and data organization?
- Do researchers have access to tools/software that supports data backup, storage, and integrity checking?
- Do researchers have access to resources (e.g., staff) who will develop tools/software that supports data backup, storage, and integrity checking?
- Do researchers have access to software and/or environments to deal with datasets that exceed what is generally available to individuals on a workstation or personal storage subscription?
- Do researchers have access to consulting, expertise, or other resources on metadata design and use?
Example areas of available consulting, expertise, websites, hand-outs, or other resources could include:- Establishing controlled vocabularies for metadata and metadata fields for repository systems.
- Help with designing metadata applicable to their research.
- Assistance in setting up metadata for reusable data sets, physical samples, research software.
- Do researchers have access to tools, consulting, expertise, or other resources on good practices for use of identifiers?
Examples of good practice include:- researchers are encouraged to use researcher identifiers; e.g., ORCiD (https://orcid.org/), ResearcherID (https://www.researcherid.com/), Scopus Author ID, etc.
- researcher identifiers are supported in the enterprise directory.
- researchers have access to mechanisms/services to establish unique digital identifiers (DOIs) for data.
Research Data Policy Compliance
- Does your institution have research data governance processes in place to establish data policies for research data?
- Do researchers have access to information and training on research data policy?
Example areas of information and training could include:- Processes to support and inform users on policy compliance.
- Training on research data security protocols.
- Support for Data Management Plan (DMP) development.
- Do researchers have access to support for analysis of research data sensitivity?
This may include:- Data Use Agreement (DUA) review/analysis and consulting.
- Institutional Review Board (IRB) templates for datasets (with human or animal subjects), from small datasets that don't need HPC, up to large datasets that need HPC or Cloud services.
- Support at the nexus of the IRB, legal counsel, and an office of sponsored programs.
- Do researchers have access to expertise and policy infrastructure to manage and use sensitive data?
This may include:- Data Management Plan (DMP) compliance services (institutional framework, etc.).
- Consulting, expertise, or other resources on contracts and government mandated data controls (e.g. FISMA, CUI, NIST 800-171, FEDRAMP, HIPAA, NAGPRA/Indigenous data rights).
- Has your institution defined and deployed a process for identifying which research data to archive, preserve, or discard?
- Do researchers have access to planning expertise for storing, archival and preservation of research data beyond the term of grant funding?
For example, do researchers' DMPs regularly include planning for the physical and/or cyber resources and facilities (including those supplied by third parties) that will provide data storage, archival, and/or preservation after the grant ends?
Research Data Security/Sensitive Data Support
- Do researchers have access to compute and data environments to manage and use moderately sensitive data?
For example, NIH dbGaP data controls. Support can include:- tools, systems, and environments that can scale from small to large data sets (i.e., from workstations to VMs and up to high performance computing).
- data security protocols in use, and monitored.
- Do researchers have access to compute and data environments to manage and use “notice triggering” data?
For example, PHI, HIPAA, Export Control, licensed data. Support can include:- tools, systems, and environments that can scale from small to large data sets (i.e., up to high performance computing).
- data security protocols in use, and monitored.
- Do researchers have access to compute and data environments to manage and use extremely sensitive data?
For example, data requiring cold room/air-gapped storage and computing, closely monitored access, dedicated data stewardship etc.
Software-Facing Topics and Associated Capabilities
Software Package Management
- Do researchers have access to support for research software package compilation and installation?
- Do researchers have access to support, facilitation or training on how to compile, install, and deploy research software?
For example, The Carpentries, documentation on how to install and deploy anaconda environment, etc. - Do researchers have access to support for research software package assessment, documentation, and validation?
That is, support to assess and document security issues, sustainability issues, export control issues, etc. associated with a software package of possible interest to researchers.
Research Software Development
- Do researchers have access to resources (e.g., staff) who can develop research software?
For example, staff to be written into grants to architect or develop specific research applications or workflow components. - Do researchers have access to resources (e.g., staff) who can develop software for wide usage?
This may include software for websites, portals, etc. - Do researchers have access to security validation for research software?
For example, analysis for vulnerabilities that can be exploited by hackers, especially for locally developed software. - Do researchers have access to usability testing for research software developed on campus?
- Do researchers have access to software or website accessibility consulting, expertise, or other resources (e.g., assessment tools, etc.)?
Research Software Optimization or Troubleshooting
- Do researchers have access to performance optimizing tools?
For example, Allinea/ARM Map, Intel VTune, etc. - Do researchers have access to support and consulting to optimize software?
For example, to parallelize code, to port to GPUs or other new architectures, to analyze and improve efficiency, etc. - Do researchers have access to diagnostic and troubleshooting software?
For example, Allinea DDT, Intel Inspector, etc. - Do researchers have access to support and consulting for diagnosing and troubleshooting software?
For example, when migrating codes to new cluster environments, new operating systems, etc. This does not include deeper code porting or rewrite for new hardware, GPUs, etc.
Workflow Engineering
- Do researchers have access to support for research workflow packages?
For example, Toil, Pegasus, NextFlow, etc. - Do researchers have access to expertise and basic support to develop or script data workflows?
For example:- support for initializing a research computing and data workflow?
- consulting on basic, common workflows, or guidance on good practices in developing custom workflows?
- Do researchers have access to dedicated staff resources to develop or script data workflows?
For example:- authoring of advanced or specific workflows for given research areas (e.g., for genomics, for clinical research, for social sciences, etc.).
- support for optimizing a research computing and data workflow?
This does not/need not include complete implementation of workflows.
Software Portability, Containers and Cloud Computing
- Do researchers have access to support for making software portable?
For example, software repositories, containerization, etc. - Do researchers have access to guidance or training for cloud computing?
This can include:- Local private campus cloud infrastructure
- National (e.g., XSEDE-supported) cloud infrastructure
- Commercial cloud platforms (e.g., AWS, Azure, GCP, etc.)
- Do researchers have access to dedicated resources (e.g., staff) for architecting and deploying cloud solutions?
This can be platform independent, and may include:- Platform evaluation/comparison, cost estimation
- Orchestration design and development (Kubernetes, Puppet, Chef, etc.)
Securing Access to Software
- Do researchers have access to credential systems as an element of software security?
For example, access to and support for integration with systems like CAS, Shibboleth, SAML, Single-Sign-on, etc. - Do researchers have access to support for utilizing licensed software on shared resources?
For example, do researchers have access to a common / shared software license server? - Do researchers have access to support for managing export controlled software?
- Are processes defined and adhered to for educating, monitoring, and auditing Research Computing and Data staff, other IT professionals, and researchers, to comply with software license agreements?
Software Associated with Physical Specimens
- Do researchers have access to management software for physical collections?
- Do researchers have access to software for discovery and research use of physical collections?
- Do researchers have access to resources (e.g., staff) for software development for discovery and research use of physical collections?
Systems-Facing Topics and Associated Capabilities
Infrastructure Support
- Do your systems-facing staff have access to a fully functional and reliable data center?
For example, a full time IT operations and equipment facility? - Is the data center professionally managed?
For example are there dedicated FTEs, change management, 24/7, person-trap, closed circuit video, appropriate access controls and auditing? - Are there institutional resources for leveraging commercial cloud services for research computing and researchers?
- Are deployment, operations, and maintenance of your infrastructure automated?
For example, using foreman, razor, puppet, ansible, chef, etc. - Do systems staff have the skills and capacity to support container deployment and orchestration?
For example, APIs, kubernetes, docker, singularity, etc.
Compute Infrastructure
- Do researchers have access to high performance (batch) computing (HPC)?
- Do researchers have access to high throughput computing (HTC)?
- Do researchers have access to a production-level compute, storage, and network environment?
- Do researchers have access to specialized hardware capabilities, such as accelerators?
For example, GPUs, TPUs, FPGAs, etc. - Do researchers have access to interactive computing services?
For example, support for VDI, Gateways, JupyterHub, etc. - Is a standardized set of operating systems supported for HPC, workstations, and/or virtual machines?
Storage Infrastructure
- Do researchers have access to active data storage services (a.k.a., "scratch" storage, often a parallel filesystem) sufficient for HTC/HPC?
- Do researchers have access to sufficient storage to support researchers' data intensive computing needs?
- Do researchers have access to mechanisms for isolated and secure support for storage of sensitive/secure data?
- Do researchers have access to policies and technologies that facilitate management and wide access to data?
For example:- Automated tiering and data migration.
- Security/compliance management support for sensitive/controlled data that require special access/export controls.
- Do researchers have access to data archival and preservation services (e.g. tape, cloud)?
- Do researchers have access to a place to store final research data to address institutional policy and/or funding agency requirements?
- Do researchers have access to support for collaborative data grids and/or data repositories?
These may be national, local, or commercial. For example, OSN, iRODS, etc.
Network and Data Movement Infrastructure
- Do researchers have access to a high-performance network that supports research within campus?
- Do researchers have access to a protected subnet or Science DMZ?
A Science DMZ is a means to securely enable high performance inter-campus data flows that bypass campus firewalls. - Do researchers have access to support for high performance data movement with dedicated data transfer nodes (DTN) and associated data movement software?
Software may include Globus, FDT, BBCP, or rclone, among others. - Do researchers have access to infrastructure for data buffering between high I/O lab instruments and the data center, and/or external resources?
Examples may include “data capacitors” or “burst buffers”. - Do researchers have access to mechanisms for isolated and secure support for movement of sensitive/secure data?
- Do researchers have access to virtualized networking techniques such as Software Defined Networks, overlays, etc.?
Specialized Infrastructure
- Do researchers have access to support for edge computing and data resources?
- Do researchers have access to support for sensors, internet of things?
- Do researchers have access to support for researcher workstations or laptops?
- Do researchers have access to support for special science instruments?
Examples may include Cryogenic electron microscopes (cryo-EM), DNA sequencers, telescopes, etc. - Do researchers have access to specialized compute capability?
Examples may include bare metal hardware, reconfigurable BIOS, OS, and network, or experimental cloud testbeds.
Infrastructure Software
- Do researchers have access to resource management and/or queuing software for managing access to resources (e.g. SLURM, Torque)?
- Can researchers leverage institutional-level Identity and Access Management?
- Do researchers have access to 2-factor authentication (where prudent)?
- Is researcher access to systems and data managed with a common, project-based or role-based tool?
- Are researchers' external collaborators able to use their home organization credentials (or ORCID IDs, etc.) to access systems and data?
- Do researchers have access to modules support to provide access to system-wide software libraries and applications?
Monitoring and Measurement
- Is there a practice in place for monitoring infrastructure at the node (individual unit) level for resources that support research?
- Is there a practice in place utilizing active network measurement tools (i.e. perfSONAR) for the research-supporting network, DMZ, DTN etc.?
- Is there a practice in place for whole system testing (e.g./chaos monkey) on resources that support research?
- Is there a practice in place for both active and passive measurement of infrastructure that supports research?
- Do researchers have access to monitoring tools as part of their workflow?
- Is performance data (on resources that support research) analyzed and used for operational decision making?
- Is a method in place to track and report resource usage at the researcher/project level?
For example, for institutional and funding agency reporting purposes.
Change Mngmnt, version control, administration, and ticketing
- Do Research Computing and Data staff follow a documented change management process?
- Do Research Computing and Data staff utilize version control repositories of services and infrastructure data?
Also referred to as configuration management. - Do Research Computing and Data staff leverage a ticketing system for user support?
- Do Research Computing and Data staff follow an established procedure for privileged account management among the administrators, including tracking of elevated privileges?
- Have Research Computing and Data staff established a workflow environment to support end-to-end network performance troubleshooting?
Documentation
- Do Research Computing and Data staff produce and regularly maintain systems facing documentation?
- Do Research Computing and Data staff have documented processes, procedures, and policies for infrastructure management?
Planning
- Do Research Computing and Data planning processes include/incorporate security and compliance considerations?
- Do Research Computing and Data staff follow a formal process for procuring research computing, data, networking, etc. resources?
For example, noting requirements, benchmarks, cost analysis, acceptance plans, terms and conditions, etc. - Is a systems and infrastructure lifecycle plan defined and maintained?
- Are researchers and governance roles engaged to explore gaps and to address emerging needs and technologies?
- Are systems-facing staff engaged with exploring, testing, and deploying emerging or advanced technologies to help research?
Best security practices for open environments
- Is Research Computing and Data (RCD) security coordinated with institutional IT Security and Compliance?
For example:- Is the institutional IT security team leveraged for training and education?
- Do RCD staff leverage institutional compliance resources/offices?
- Are Security Best practices implemented (such as those from NIST, trusted CI, CVE, and others)?
Example practices include:- Are security zones defined for different data sets and science workflows?
- Is monitoring in use for intrusion detection, malware, and other threats?
- Is there a security incident response plan, and an associated response team?
Example practices include:- Are the associated procedures followed when incidents arise?
- Are the plan and team membership reviewed on a regular basis (e.g., annually)?
Strategy and Policy-Facing Topics and Associated Capabilities
Institutional Alignment
- Does your Research Computing and Data (RCD) team/group have a strategic plan, and is this strategic plan updated on a regular basis?
For example, is there an annual or bi-annual review of your plan? - Is your Research Computing and Data (RCD) strategic plan aligned to campus plans?
For example:- Does the RCD plan connect/relate to an institutional (campus-wide) strategic IT plan?
- Does the RCD plan connect/relate to an overall institutional (campus-wide) strategic plan?
- Do the Research Computing and Data (RCD) service and support community and underlying IT service providers have a good awareness and understanding of major research efforts/initiatives across the institution?
- Are research priorities, and Research Computing and Data (RCD) strategic priorities well-understood by your institution's management and planning groups?
Example measures may include:- Are the institution's research priorities well-understood by campus leadership?
- Are RCD strategic priorites understood and supported by campus leadership?
- Is there a Faculty Advisory Group (or equivalent) that provides review and advice on priorities for the Research Computing and Data (RCD) program?
- Does this group meet regularly (e.g., quarterly or once a semester) to review and advise?
- This is generally a dedicated group for RCD, although it may be part of a larger research or IT advisory body.
- Does institution-level management and planning recognize and value the impact of Research Computing and Data (including return/value on investment)?
For example, are research computing and data services valued at the same level as or higher than other enterprise services when discussing of prioritization of campus (budget) resources? - Are researchers effectively informed and made aware of Research Computing and Data (RCD) resources and services?
For example:- Is there an institutionally defined role that includes responsibility to create awareness of RCD resources and services available on campus or externally?
- Are RCD services documented in an accessible platform, such as an IT service catalog?
- Is the importance of outreach and training recognized by campus leadership?
- Are Research Computing and Data (RCD) resources and services available in support of instruction or other pedagogical uses?
For example:- Can and do instructors leverage research computing and data resources for instruction?
- Are instructors effectively informed about available resources?
Institutional Culture for Research Support
- Is there an understanding across the IT organization, research community, and institutional leadership of the distinction between Research Computing and Data services and standard (enterprise) IT services?
Note: This does not imply greater importance of one or the other, nor is it meant to imply how an organization should support each. Rather, it is a recognition that the goals, constraints, metrics, and support models tend to be quite different. - Is facilitation of Research Computing and Data services recognized as an important role to the campus?
- Are Research Computing and Data operating metrics captured and reported to leadership?
For example, is this data shared with IT leadership, Office of Research, or other institutional leadership)?
Funding
- Are Research Computing and Data services funded in a sustainable manner?
For example:- Is there recurring program budget for the staff and services operations (i.e., not primarily dependent upon grants or other non-recurring funding)?
- Are campus funding partnerships formalized with an MOU or equivalent agreement?
- For activities funded from contracts and grants, is there a strong track-record of renewed funding?
- Are new funding opportunities proactively identified and assessed at an institutional level, for relevance to institutional mission and alignment to Research Computing and Data needs and priorities?
- Do research funding activities actively integrate the Research Computing and Data (RCD) services group?
For example:- Do RCD groups/teams collaborate with the Contracts and Grants groups/teams?
- Do RCD staff assist Principle Investigators (PIs) with proposal preparation?
- Do Research Computing and Data (RCD) services groups/teams submit (extramural) grant proposals for RCD investments and innovations?
- Have Research Computing and Data (RCD) services groups/teams been awarded (extramural) grants they applied for, in support of RCD investments and innovation?
Partnerships and Engagement with External Communities
- Do Research Computing and Data (RCD) services groups/teams actively engage with regional and/or national Research Computing and Data peers/communities?
For example, regional research network providers, CaRCC, CASC, Internet2, Campus Champions, NSF regional Big Data Hub, etc. - Are institutional Research Computing and Data services provided to external users, such as hosting data repositories, providing computing resources, etc.?
For example, are you a provider to XSEDE or the Open Science Grid (OSG)? - Is there a practice of active engagement of your institution in external partnerships (for funding, or for advancing Research Computing and Data activities and interests?
For example, are there regional partnerships, and/or active industry partnerships?
Professional Development of Research Computing and Data Staff
- Are Research Computing and Data (RCD) staff provided with professional training opportunities?
For example:- Do RCD staff have access to funding for training?
- Does each RCD staff member have a professional development plan?
- Are Research Computing and Data staff provided with opportunities for career advancement?
For example:- Are there clear career paths defined for each role?
- Are staff encouraged/supported in pursuing career advancement opportunities?
- Are Research Computing and Data (RCD) staff permitted to use staff time to engage in regional or national community efforts?
For example:- Do RCD staff participate in regional networks, Campus Champions work, Linux user groups, CaRCC, etc.?
- Do RCD staff contribute to the Carpentries work (training materials or activities)?
Diversity, Equity, and Inclusion
- Is there a policy and practice to ensure (and if necessary, improve) diversity, equity, and inclusion, on the Research Computing and Data (RCD) staff?
For example:- Are RCD staff regularly surveyed on engagement, cultural climate, etc.?
- Does RCD management track this over time?
- Are the results used to develop ongoing strategies to improve diversity, equity, and inclusion?
- Are Research Computing and Data recruitments (job listings) reviewed for inclusive language to attract a broad range of applicants?
- Do Research Computing and Data staff have access to diversity, equity, and inclusion training?
For example, on unconscious bias, communication styles, multicultural awareness, etc.