Navigated to

Checklist: Securely managing your information

Before beginning data collection, you need to ensure that you manage your information securely. Your information classification and risk and vulnerability analysis will be of great help in analysing your information security. The data management plan, in turn, helps you determine what to discard or archive. This page is part of Checklist for research projects.


To securely manage information

Report any incidents immediately

Immediately report if you discover or suspect that an unauthorised party has accessed personal data, if an IT attack or data breach is occurring, or if you lose a mobile phone or important documents. Report incidents if important information or operations are subject to espionage, sabotage, terrorism or other crimes. Report incidents.

Find the archive coordinator at your department

If you are uncertain who is archive coordinator at your department, the University's research data support team can guide you.

Latest update: 2025-11-28

Learn more about information security and data management

Hands on a keyboard in front of a screen with an open padlock.

Security awareness (Aktum)

Find employee training and a checklist to improve IT and information security (UMU ID required).

Two hands typing at a keyboard with an open padlock on a screen in front.

Information security

Plan for secure information management throughout the research project.

Two signposts pointing in different directions.

Guide to managing research data

Brief chronological guide to managing research data, with further reading.