Required cookies

This website uses cookies necessary for its operation in order to provide the user with content and certain functionalities (e.g. language selection). You have no control over the use of these cookies.

Website visitor statistics

We collect visitor statistics on the use of the site. The data is not personally identifiable and is only stored in the Matomo visitor analytics tool managed by CSC.

By accepting visitor statistics, you allow Matomo to use various technologies, such as analytics cookies and web beacons, to collect statistics about your use of the site.

Change your cookie choices and read more about visitor statistics and cookies


The requirements for secure environments must enable a diverse ecosystem for research, statistics and other data exchange. Findata as the primary licensor should be able to review licence applicants over a longer period of time so that the entire evaluation process does not have to be started from scratch, but that previously submitted applications and unchanged data can be taken into account in subsequent applications.

The CSC recognises that many research projects involve participants from several organisations, which means that all users need access to the same secure environment. Therefore, the requirements for secure environments should enable a centralised secure environment rather than building a separate system for each actor. The user environment must also be user-friendly from the point of view of the end-user, such as researchers.