Research systems connect is a fully managed, cloud-based service that joins up your existing institutional research systems (including your CRIS, repository and preservation systems) so you can save time on transferring data and metadata between your systems and free up staff time for other tasks. It also connects to external scholarly communications services, maximising impact with minimal effort.
The service is based on an interoperability framework that uses an open, extensible data model and message APIs. The service simplifies workflows by using adaptors to automate the transfer of data and metadata between systems, helping you manage your research outputs and information more effectively.
Through integration with scholarly communications services it also supports your institution to play its part in national and international initiatives that promote open scholarship such as Plan S and the FAIR principles.
Research systems connect is a fully managed service and we maintain the integrations and workflows, saving you time and money.
A fully-managed, robust service hosted on a secure cloud-based platform
Integrates different kinds of research management systems, facilitating efficient transfer of data and metadata between systems
Automates complex workflows, improving accuracy and data consistency while freeing up staff time for other tasks
We can work with any systems supplier or vendor you already use, and as a user, you can help us shape future integrations
Co-created with HEIs to comply with funder and publisher mandates about retaining and reusing research data
How to join
Onboarding is straightforward. We join your research systems and platforms by mapping your metadata to our data model.
Our interoperability framework means we can create new adapters for your various systems quickly and easily. This allows your systems to push and pull data and metadata and research systems connect routes these to the required destination system.
Our standard cover runs from 09:00 to 17:00 (GMT/BST), from Monday to Friday (inclusive), but excluding public holidays for England and specific Jisc closure days (Jisc closure days are typically any non-public holiday days and between 25 December-1 January).
Our monitoring service runs 24/7 and major issues are dealt with accordingly by our out-of-hours incident team. Our service level agreement (SLA) timers run only during your agreed hours of cover. Our monitoring runs 24/7, 365 days of the year regardless of your cover.
Examples of priorities
Priority 1 – service down (everyone is affected, and a major business process is stopped)
Priority 2 – service slow (everyone is affected, and efficiency is degraded)
Priority 3 – a function does not work but there is another way to achieve task (everyone is affected but there is an easy workaround)
Priority 4 – only one person has an issue (your efficiency is lower but you’re the only person affected)
Priority 5 – minor issue for only one person with a workaround
We aim to be flexible and recognise that sometimes there are special circumstances. Perhaps the issue affects your customers, or key staff are having issues with a critical project with an impending deadline.
Our technicians can override our standard priority assessment where there is good reason, if you have made us aware of it.
How to contact us
To report an incident, you can contact us in multiple ways.
Raise a ticket through the Jisc helpdesk (between 07:00-00:00, Monday - Friday)
We will give two months' notice of any scheduled maintenance. Any outage during this time is not included in the calculation of the availability.
From time to time we will need to carry out emergency maintenance not covered in the scheduled maintenance.
In the event of emergency maintenance being needed we will inform you with as much notice as we can.
Information security and safeguarding data
We use industry standards and best practices for your information security. As an organisation we conform to ISO/IEC 27001 code of practice.
The Jisc repository was ISO 27001 audited in February 2020. This includes: assessing security risks, taking account of the threats, vulnerabilities, impacts, implementing information security controls and review of these information security controls so they continue to meet security needs.
A quarterly review meeting will be held with a representative from Jisc to review the service, any issues and to see how we can provide a better service to you.