23. Open Curated Controlled Secure
Open
Research
Anonymised
Data
Good
Communication
Data
Management
Data
Retention
Subject Access
Requests
Data
Controllers
Data
Processors
Data Protection
Officers
Database
encryption
Data
Security
Breach
notifications
27. Learn Check Discover Share
Education
Communication
GDPR
Checklists
Compliance
Checklists
ICO
Networking
Open Access
groups
Jisc
Best Practice
Experience
Case Studies