Navigated to

Templates for information security and data management

Planning the project’s information processing is a prerequisite for managing information securely throughout the research project. The following page provides templates and support for conducting information classification and risk and vulnerability analysis and drawing up a retention and deletion plan or a retainment plan. It also has templates for secrecy examination and consent forms for research subjects.


Information classification

Use a tutorial to help classify your information and resources to determine necessary protective measures.

Visit Aktum to download templates for information classification (UMU ID required)

Learn more about information classification in research

Risk and vulnerability analysis

Once you know how sensitive the information to be processed is and when planning how it will be managed within the project, you will need to conduct a risk and vulnerability analysis. This analysis describes likely threats linked to your information processing and how the risks should be managed in the project.

Visit Aktum to download templates for conducting a risk and vulnerability analysis (UMU ID required)

Learn more about risk and vulnerability analyses in research

Data management plan

A data management plan (DMP) describes how you will manage data during the research process. Umeå University recommends that you draw up a data management plan, even if your funding body does not require one. To make your work easier, you can use the DMPonline tool.

Find out more about drawing up a data management plan and about DMPonline

Retainment plan

If your research project uses an IT system or IT services that is not already provided by the University, you need to draw up a retainment plan that describes how the information in the project will be managed from an archival perspective. 

Find out more about when you need and how to draw up a retainment plan

Template for documented secrecy examination

When disclosing research data containing information covered by secrecy, as per Section 7 of the Public Access to Information and Secrecy Ordinance (OSF) or Chapter 24, Section 8 of the Public Access to Information and Secrecy Act (OSL), to a recipient at a Swedish public authority for research purposes, you can use the simplified template to document your secrecy examination. This type of disclosure could occur in a research collaboration or because the recipient wants to reuse research data in new research.

Template for simplified secrecy examination when disclosing research data to another Swedish public authority

Read more about secrecy for research data

Template for informing research subjects about processing of personal information

The Swedish Ethical Review Authority has a template that you can use when informing research participants taking part in your project.

Note that the template does not include all the information on how personal data is processed. You always need to supplement this template with Umeå University’s own template when processing personal data in research. 

The Swedish Ethics Review Authority’s template for research subjects (etikprovningsmyndigheten.se)

Template for information on personal data processing in research

Read more about consent for inclusion in research

Do you have a question?

If you have questions about personal data processing, please contact the legal officers at pulo@umu.se (data protection) 


For questions on research data management, please contact the university-wide research data support team.

Contact the research data support team

Latest update: 2025-06-10

Learn more about information security and research data

Detalj på två personer som sitter vid ett bord med papper och pratar med varandra. För att illustrera samarbete, möte eller grupparbete.

Plan a project

Plan for information security, selecting IT services and writing agreements.

Illustration som föreställer en skylt med vägvisning

Guide to managing research data

Brief chronological guide to managing research data, with further reading.

Illustration of hands on a keyboard in front of a computer screen with an open padlock.

Security when conducting research

Basic and in-depth information about safety and security in research.