3.2. How is information security and access to data controlled?

The full question in DMP Roadmap reads "How is information security and access to data controlled, for example in reference to sensitive data and personal data?"

In the video below, we provide guidance concerning what you are expected to write (what they are asking for) and where you can get inspiration or help if you are unsure what to answer.

Links

Link to the document Guidelines on information security at Lund University (PDF)

Link to the Swedish National Data Service’s guide to protecting research data Links to an external site.

Link to the Faculty of Medicines information page about LUSEC

Link to the Swedish National Infrastructure for Computing’s (SNIC) webpages Links to an external site.