The browser you are using is not supported by this website. All versions of Internet Explorer are no longer supported, either by us or Microsoft (read more here: https://www.microsoft.com/en-us/microsoft-365/windows/end-of-ie-support).

Please use a modern browser to fully experience our website, such as the newest versions of Edge, Chrome, Firefox or Safari etc.

Security issues in research

Observing security issues are becoming increasingly important in research. The University is being more frequently subjected to cyberattacks and influence campaigns, and there is a greater risk that research information is misused. Lund University works to protect research, data, results and collaborations.

Export control

Information and research results can be spread and misused due to improper and unauthorised use.

Export control: is a collective term for the laws and regulations that govern and prevent strategically sensitive products such as war materials and dual use items falling into the wrong hands.

Export: refers to physical transport as well as electronic and oral transfer of information.

Dual-use items (DUIs): have a civil area of application, but can also be used for a military purpose. At the University, this often relates to research results, information, specific knowledge, publishing and cloud services. See the information box “What are categorised as dual-use items?” in the right-hand menu.

The researcher’s responsibilities: As a researcher, you are responsible for assessing if there is a potential dual use, for taking necessary security measures and for applying for necessary export permits. You are also responsible for protecting the product from theft and data breaches.

Information security

Information and research data are among the University’s most valuable assets. All staff members have a responsibility to protect these assets from unauthorised persons and maintain their reliability and accessibility. Improper use or inadequate management could, for example, lead to delays in research and teaching, result in inaccurate research results, and go against existing laws concerned with the processing of personal data.

The researcher’s responsibilities: As an employee, you are responsible for managing information and data (digital, written and spoken) in a secure way. You are also responsible for storing equipment and documents securely. This applies to all types of information and data, not just that relating to your research. 

Read more about information security and the University’s work in this area 

Security breaches: that relate to any type of information at the University are to be reported internally. If the security breach involves personal data, it may also be classified as a personal data security breach. 

Report suspected incidents and breaches here

How to manage a security breach involving personal data

 

Freight ships and the cloud

Internal courses

Basic Information Security (will be available shortly in Kompetensportalen)

Learn more

What is categorized as dual use?

  • Nuclear material, facilities and equipment
  • Special materials and associated equipment
  • Material processing
  • Electronics
  • Computers
  • Telecommunications and "information security"
  • Sensors and lasers
  • Navigation and avionics
  • Marine
  • Space and propulsion