3.2. How is information security and access to data controlled?
The full question in DMP Roadmap reads "How is information security and access to data controlled, for example in reference to sensitive data and personal data?"
In the video below, we provide guidance concerning what you are expected to write (what they are asking for) and where you can get inspiration or help if you are unsure what to answer.
Links
Link to the document Guidelines on information security at Lund University (PDF)
Link to the Faculty of Medicines information page about LUSEC