Security protection
As a research leader or operations manager, you can use this material to assess whether there may be data or assets worthy of protection (in terms of security legislation) in your research project (new or existing) or in your operations. The aim is to assess whether there may be a need for security enhancement measures at the start of or in ongoing research projects.
If you suspect that your department handles material that falls under the Security Protection Act, contact Henrik Werner.