Breadcrumbs List.
Data access and protection
-
Data access controls
Services, tools and advice to control access to data during the project.
-
De-identifying data
What de-identification is, and how to de-identify datasets.
-
Encrypting research data
How encryption can be used to secure stored research data or enable secure data transfers.
-
Choosing data transfer services
University-approved research data sharing and transfer tools.
Jump to section...
This dialog can be closed by pressing Escape close button.