154 search results for “privacy” in the Staff website
-
Gera van Duijvenvoorde
Faculteit Rechtsgeleerdheid
-
Storage and data recovery
As a standard, your workplace comes equipped with a limited amount of disk space. We offer a number of options for extending your disk space. In addition, ISSC can help you recover lost files. You can also securely store your files in the cloud via OneDrive and Teams. Whichever storage you use, be aware…
-
Installation security cameras in the Herta Mohr building
Organisation
-
Security
The University aims to ensure a safe and secure (digital) environment. We all share the responsibility for protecting information, ourselves and the University. We encourage you to find out about safe working practices, a safe work environment and secure management of sensitive information. .
-
Microsoft Authenticator
After entering your username and password in Teams, Office 365 and OneDrive, you need to confirm your login through the Microsoft Authenticator app. This is an extra security step (multifactor authentication).
-
Tools and tips for working securely
Curious to find out how you can contribute to a safe working environment? Then keep reading to discover our tips for working securely. They will help you to work more safely in specific situations. This section contains tools and tips to promote safe working habits in specific situations.
-
Alan Sears
Faculteit Rechtsgeleerdheid
-
Mohammed Raiz Shaffique
Faculteit Rechtsgeleerdheid
-
Eduard Fosch Villaronga
Faculteit Rechtsgeleerdheid
- Zoom
-
Research using personal data
If your research project involves collecting private or otherwise sensitive data, you must ensure adequate data protection measures are taken. Research must be conducted in accordance with the General Data Protection Regulation (GDPR). In terms of patient data, for instance, when used for research carried…
-
Gavin Robinson
Faculteit Rechtsgeleerdheid
-
Bart Custers
Faculteit Rechtsgeleerdheid
-
Data Management Training Leiden Law School
Research
-
Sharing student data
Handling student data is a necessary part of your work as teacher or invigilator.
-
Data storage
Your options for data storage may vary depending on factors such as size and sensitivity of the data or collaboration with partners outside the university. We are all responsible for data protection. To keep (personal) data as secure as possible, the university has established an information security…
-
Security
All university locations and buildings are monitored and fitted with cameras. Read on to find out where to get advice about security for a building, person or event that may be at higher risk.
-
One-off data processing
Are you handling personal data just once, for instance when taking the minutes of a meeting or organising an employee outing? You do not need to include this use in the data processing register if you stick to the following conditions.
-
Nursing mothers' rooms Pieter de la Court Building
Pieter de la Court, Wassenaarseweg 52, 2333 AK, Leiden
-
Graduate School FGGA: Research data management course
Didactics, Career development
-
Factsheet Zoom
Zoom is available to LEI lecturers, staff and students.
-
Deleting personal data
Individuals have the right to instruct the university to delete their personal data in a number of cases. For instance, if the university no longer needs the data, or if the person withdraws consent previously given.
-
Camera surveillance
Whether you’re a student, staff member or external service provider, it’s important that you feel safe at Leiden University. A range of measures are in place to assure safety and security in all the university’s buildings and grounds.
-
ICT
Good ICT resources are crucial for having a smooth working environment at your new place of employment. Here we briefly explain what you need and where you can find the most important ICT services.
-
Data Protection Day: are you keeping personal data safe?
Security
-
Sabine Witting
Faculteit Rechtsgeleerdheid
-
Simone van der Hof
Faculteit Rechtsgeleerdheid
-
Online security: be vigilant with free services
ICT
- Cybersecurity month: Follow good information security practices
-
Using images at Leiden University
Images are an increasingly important part of communication, but how do you choose suitable ones for the website and where can you find them? This page offers tips on finding the right image and what to watch out for.
-
(Personal) mobile devices
If you have a mobile device such as a smart phone or tablet that you purchased privately but also use for work-related purposes, it is important that you save your documents securely and deal responsibly with confidential information.
-
Organising online events
The Events Office is happy to help organise an online event, but you can also do it yourself. You will find resources and support for this on this page.
-
Social media
Social media is a good way to meet others or to hear about the latest news and developments. It is an excellent way to tell people about what you are doing and to hear what they are up to too. But social media also has its downsides: disinformation, trolling, disrespectful comments and even the misuse…
-
Research funding
Leiden University offers a broad range of support for finding, writing, and applying for research funding. The first point of contact is your local grant adviser at your faculty/institute, who can guide you through the application process and answer any questions you may have. If your faculty/institute…
-
Data breach public groups in SharePoint/Teams
Security
-
Data breach at Leiden University
Organisation, Security
-
Executive Board decision after University Council advice: People counters will not be switched on again
The more than 370 sensors that have been hung up in Leiden University buildings to count the people present will not be switched on again. The equipment will eventually be removed from the buildings.
-
Cybersecurity Awareness Month: what information are you sharing online?
ICT, Security
-
Data breach in public groups in SharePoint/Teams
ICT, Security
-
Classroom scanners in the Lipsius building tested by ethical hackers
To check whether the classroom scanners are secure, a ‘pen test’ was performed in the Lipsius building on Monday 28 March. This involved switching on the person counters for a day so that ethical hackers could try to gain access to the system.
-
Cybersecurity Awareness Month: Always report incidents – even if you’re unsure!
ICT, Security
-
Zoom available for teaching from 22 January on
From 22 January on, the video conferencing app Zoom will be available for students and teachers at Leiden University. The University is responding to calls by staff and students, and has now acquired the programme.
-
Executive Board of the University asks University Council for advice on activating person counters/sensors
The Executive Board of Leiden University has asked the University Council to advise on its proposed decision to reactivate the person counters/sensors in due course. The Council will now look at this carefully before the Board makes a final decision. The advice of the University’s participation body…
-
Professor Bart Schermer on digital threats to the university
Professor of Privacy and Cybercrime Bart Schermer researches the relationship between new digital technologies, enforcement and human rights. What cybercrime trends can he see that are relevant to an organisation like Leiden University?
-
Sharing student data? Do so safely!
Education
-
ChatGPT now also with up-to-date information
Education, ICT
-
Protest against classroom scanners at Lipsius building
On Tuesday a few dozen students and staff from Leiden University protested on the square in front of the Lipsius building against the classroom scanners that have been installed in buildings and lecture halls. They are demanding that the scanners be removed.
-
Three questions about the Ethics Committee
Whereas ethical research rules were previously mainly associated with the sciences, today they also play an increasingly important role in the Humanities. What are the consequences of this for researchers in the Humanities? And when do you need the Ethics Committee? We discussed this question with Dorota…
-
Be aware of the risks of using chatbots like ChatGPT in your work
Security
-
How cyber safe are you? Take the survey and you could win an iPad
Security