Security in research
Security in research
In the planning of your research project, you need to consider different aspects of safety. This may involve, for example, information security and security in the physical work environment.
Information security
Information is one of the most important assets in research. It is therefore of great importance that everyone involved in research at BTH works continuously with information security. That is, how different types of information should be handled.
Information security is about protecting the confidentiality, accuracy and availability of information, regardless of whether the information is in digital form, on paper or if it is oral.
Confidentiality – that information is only accessible to authorized persons. For example, research results and research data are not accessible to unauthorized persons before publication.
Accuracy – that information is reliable, accurate and complete. For example, that research data is not distorted and in the long run leads to wrong decisions.
Accessibility – that information is available based on the needs of the business. For example, that we have access to the information and IT systems required for us to be able to carry out the research.
Read more on Inside about how to manage your research in a secure manner.
Data management
When planning your research project, you should also plan how research data will be collected, stored and managed during the project, as well as how research data will be made available after the end of the project.
A data management plan is a document that describes, among other things, how research data should be collected, stored, managed, documented, used and made available during and after the research project. In many cases, funders require that there should be a data management plan for the project. The data management plan is a living document that can be continuously updated during the project.
The University Library’s resources on research data
It is also important to classify the data handled in research to ensure that it is stored correctly.
It is particularly important to identify whether sensitive information is being processed, e.g. confidential data, or sensitive personal data (health, political opinions, ethnic origin, …). Depending on the type of information to be processed, different types of storage locations are recommended.
Read more on Inside about how to store your research in a secure manner.
Dual use
Research at BTH may have both a civilian and a military use. This means that BTH must ensure that certain products or technology are not exported or transferred abroad without first investigating whether there is a requirement for a permit.
Export control requirements
The export control requirement applies to munitions and dual-use items for both export and transfer.
Authorisation applies to items that can be classified as dual-use items and to technologies for the development, production or use of certain items, for export or transfer.
Export control at BTH must therefore be carried out as part of the safe handling of research activities worthy of protection at the university to prevent certain products from falling into the wrong hands or being used incorrectly.
Read more on Inside about how to handle research that can be classified as dual use.