Navigated to

Templates for information security and data management

Planning the project’s information processing is a prerequisite for managing information securely throughout the research project. The following page provides templates and support for conducting information classification and risk and vulnerability analysis and drawing up a retention and deletion plan or a retainment plan. It also has templates for secrecy examination and consent forms for research subjects.


Information classification

Use a tutorial to help classify your information and resources to determine necessary protective measures.

Visit Aktum to download templates for information classification (UMU ID required)

Learn more about information classification in research

Risk and vulnerability analysis

Once you know how sensitive the information to be processed is and when planning how it will be managed within the project, you will need to conduct a risk and vulnerability analysis. This analysis describes likely threats linked to your information processing and how the risks should be managed in the project.

Visit Aktum to download templates for conducting a risk and vulnerability analysis (UMU ID required)

Learn more about risk and vulnerability analyses in research

Data management plan

A data management plan (DMP) describes how you will manage data during the research process. Umeå University recommends that you draw up a data management plan, even if your funding body does not require one. To make your work easier, you can use the DMPonline tool.

Find out more about drawing up a data management plan and about DMPonline

Retainment plan

If your research project uses an IT system or IT services that is not already provided by the University, you need to draw up a retainment plan that describes how the information in the project will be managed from an archival perspective. 

Find out more about when you need and how to draw up a retainment plan

Template for documented secrecy examination

You can use the simplified template to document your secrecy examination if the following three prerequisites apply:

  • The data includes information classified as secret as per Section 7 of the OSF or Chapter 24, Section 8 of the OSL.
  • The recipient works at a Swedish authority, such as another university.
  • The recipient will use the data for research purposes.

For example, disclosure may take place in the context of a research collaboration or because the recipient wants to reuse research data in new research.

Template for documented secrecy examination when disclosing research data to another Swedish public authority (in English)

Read more about secrecy for research data

Template for informing research subjects about processing of personal information

The Swedish Ethical Review Authority has a template that you can use when informing research participants taking part in your project.

Note that the template does not include all the information on how personal data is processed. You always need to supplement this template with Umeå University’s own template when processing personal data in research. 

The Swedish Ethics Review Authority’s template for research subjects (etikprovningsmyndigheten.se)

Template for information on personal data processing in research

Read more about consent to participate in research

Do you have a question?

If you have questions about personal data processing, please contact the legal officers at dataskydd@umu.se (data protection) 


For questions on research data management, please contact the university-wide research data support team.

Contact the research data support team

Latest update: 2026-02-06

Learn more about information security and research data

Two people in discussion over a paper at a table.

Plan a project

Plan for information security, selecting IT services and writing agreements.

Two signposts pointing in different directions.

Guide to managing research data

Brief chronological guide to managing research data, with further reading.

Illustration of a security camera and a door locked with a chain and padlock.

Security when conducting research

Basic and in-depth information about safety and security in research.