Paragraph 1.1-1.3

1.1 Examine the hacked e-mail exchanges, other relevant e-mail exchanges and any other information held at CRU to determine whether there is any evidence of the manipulation or suppression of data which is at odds with acceptable scientific practice and may therefore call into question any of the research outcomes.

1.2. Review CRU‟s policies and practices for acquiring, assembling, subjecting to peer review and disseminating data and research findings, and their compliance or otherwise with best scientific practice.

1.3. Review CRU‟s compliance or otherwise with the University‟s policies and practices regarding requests under the Freedom of Information Act („the FOIA‟) and the Environmental Information Regulations („the EIR‟) for the release of data.

%d bloggers like this: