Skip to main content

NVivo

NVivo is a qualitative data analysis and organizational tool to help users work with unstructured data.

Faculty, staff, and graduate students of the University of Maryland, College Park (UMD) only. Software can be installed on machines that are owned by the individual as well as university owned equipment and must be used for work-related purposes only. Software must be uninstalled by the individual after they leave the university.

How to Get or Use This Software

This software requires a product key, which is usually entered during installation. Find on page: https://terpware.umd.edu/Windows/Title/3459

Available To:

Faculty

Regular Staff

Students

Temporary Staff

Platforms:

Installation Notes

Nvivo keys are only valid for version 14.

You will need to create an account and download the NVivo software from the link located here

If you already have a previous version of NVivo for Mac installed, make sure the application is closed before you install this version. You can choose to Keep both versions or Replace the older version of NVivo. If you keep both versions, you can rename the second one.

Resources to get Users Up and Running:

  • Video tutorials, online Help and Getting started Guides are available here
  • NVivo training options are available here

If you encounter issues when installing your software, please complete the online Support request form here

License Information

Security Note

The following third-party tools and apps have been vetted by the DIT Security team to ensure they meet the USM IT Standards. Vetting by the DIT Security team does not mean that UMD has an enterprise-level contract in place for these third-party tools and apps.

This list is solely for products that have been assessed by the DIT Security team. A comprehensive review requires a product to be vetted for Privacy, FERPA, ADA and Procurement. Please contact the DIT Security team to initiate or follow up on the review status. 

The DIT Security team would will conduct risk assessments on cloud service providers and if the data elements used are classified as High or Restricted or if the third party application is connecting or integrated to a system that houses High or Restricted data for example (SIS or Canvas) Units or Departments  that choose to outsource technology services to third-party cloud providers. Institutions must assess, and take steps to mitigate, the risk of unauthorized access, use, disclosure, modification, or destruction of confidential institutional information. This USM IT Security standard only applies to third-party cloud technology service agreements for mission critical systems as well as where confidential information will be transmitted, collected, processed, stored, or exchanged with the cloud service provider. 

Commensurate with the risk, request and, if available, obtain, review, and document control assessment reports performed by a recognized independent audit organization. Examples of acceptable control assessment reports include (but are not limited to): AICPA SOC2/Type2, PCI Security Standards, ISO 27001/2 Certification or FedRAMP

Both the Office of General Counsel and the Department of Procurement and Strategic Sourcing advise against accepting click-through, click wrap and similar agreements to download software and apps.

Click-through and similar agreements are binding legal contracts. Only University of Maryland (UMD) personnel with delegated signature authority (not delegated purchasing authority) are permitted to sign legal agreements on UMD's behalf. Also, most click-through agreements contain terms and conditions that UMD is prohibited by law from accepting. Instead, UMD personnel should work with their business office or Procurement team to obtain appropriate contract terms, even for free software and apps.

Extensive reviews by DIT Security have found that most free software and applications do not come with security features associated with the enterprise version. Additionally, free software is rarely free. The absence of a monetary cost is typically substituted by the vendor mining the user's data. This data may be protected by federal and state laws and regulations, USM and UMD policies, or the terms of UMD's legal agreements or both.

Refer to this list of software not recommended for use by DIT Security.

More Information

Support

Back to Top