Here, it is important that you choose software and methods based on the information classification and the risk and vulnerability analysis, and that you primarily use software that has been procured by the University.
If you will be using a cloud service, you must ensure that the right service is used in the right way and that no sensitive personal data is shared.
You must also review how you share the material with each other within the project, and ensure that the spaces where you work are not backed up or duplicated unexpectedly.
However, it is important that you always ensure there are secure backups.