335 search results for “privacy identiteit” in the Staff website
-
Why we are raising everyone’s awareness about cybersecurity: ‘Do things ever threaten to go horribly wrong here? Definitely.’
The university makes staff aware of the importance of cybersecurity at work. And that is essential, say our privacy and security officers. Because the number of cyberattacks is increasing, hackers are getting smarter all the time and by far the majority of problems are caused by human error. ‘Is that…
-
Wouter Hins
Faculteit Rechtsgeleerdheid
-
Els Kindt
Faculteit Rechtsgeleerdheid
-
Bart Schermer
Faculteit Rechtsgeleerdheid
-
Gera van Duijvenvoorde
Faculteit Rechtsgeleerdheid
-
Carlotta Rigotti
Faculteit Rechtsgeleerdheid
-
Oliver Tuazon
Faculteit Rechtsgeleerdheid
-
Daniel Vale
Faculteit Rechtsgeleerdheid
-
Eleftheria Makri
Science
-
Age checks need to respect children's rights
A variety of age checks are required, both in order to protect children and to ensure that they can participate online, a new study funded by the European Commission finds. The article on the study, co-authored by Simone van der Hof, Professor of Law and Digital Technologies at eLaw, was published in…
-
Gianclaudio Malgieri appointed to the Programme Committee of PLSC
Gianclaudio Malgieri, Associate Professor of Law and Board member at eLaw, has been appointed to the Programme Committee of PLSC, the Privacy Law Scholarship Conference, one of the world's most attended academic privacy conferences. Gianclaudio is the only representative from a Dutch university and…
-
How to make cryptographic techniques more efficient?
Sharing scientific data, transferring money, or sending other sensitive information online: with cryptography, applications make sure your data does not fall into the wrong hands. Mathematician Thomas Attema (CWI/TNO/Leiden University) helps with this. For his PhD research, he developed a new technique…
-
The link between The Hague bonfires and different types of citizenship
For the third year in a row, the bonfires in the Duindorp and Scheveningen neighbourhoods in The Hague during New Year's Eve have been cancelled. According to Professor Henk te Velde, the fight for the bonfires represents something bigger: angry citizens.
-
'AIVD loopt risico's door het gebruik van Israëlische hacksoftware'
De AIVD gebruikt omstreden hacksoftware van de Israëlische leverancier NSO Group, meldde de Volkskrant. In 2019 zou de telefoon van topcriminineel Ridouan Taghi er mee gehackt zijn.
-
'GDPR is no excuse for not tracing children placed in care'
The GDPR privacy legislation is no impediment to handing out sanctions to Russian oligarchs or reuniting children placed in care with their parents, says privacy experts Anna Berlee, Marlies van Eck, Simone van der Hof, Simone Huting, Friederike van der Jagt and Jeroen Terstegge.
-
Alan Sears
Faculteit Rechtsgeleerdheid
-
Eduard Fosch Villaronga
Faculteit Rechtsgeleerdheid
-
Data processing register
A data processing register is a record of which personal data you process and who you share this data with. If you collect personal data for your research, you must record this in the data processing register.
-
‘Supervision of the fight against cybercrime is poorly regulated'
Investigation services and cyber criminals both make grateful use of the opportunities offered by digital technologies. Both groups' use of these services leads to breaches of privacy for citizens. The current legislation falls short in providing protective measures, is the conclusion reached by Professor…
-
Help and support
Are you looking for a contact person, because you for instance have a question about privacy, or you need a ULCN guest or uSis account? Or do you need a manual or application form? Below you will find more information.
-
Malgieri's co-authored paper on PETs presented and published at FAccT Conference 2024
Gianclaudio Malgieri's paper entitled 'The unfair side of Privacy Enhancing Technologies: addressing the trade-offs between PETs and fairness', coauthored with Alessandra Calvi from Vrije Universiteit Brussel and Dimitris Kotzinos from Paris Cergy University, is set to be presented at this week's prestigious…
-
'Legislation to reveal identity internet troll also conceivable in the Netherlands'
Australia wants to introduce a law that makes it possible to demand the identity of anonymous internet trolls. Is this be conceivable in the Netherlands?
-
Simone van der Hof in podcast on GDPR and children’s rights
In a podcast of the Netherlands Internet Governance Forum (NL GF) and the Safer Internet Centre Nederland, Simone van der Hof, Professor of Law and Digital Technologies at Leiden University and Thijs Hannema, a lawyer at Kennedy van der Laan, discuss online privacy of children.
-
Personal data
As a university employee, you probably work with personal data. That is not just names and telephone numbers – it can also include things like cookies. How can you make sure you are working in a privacy-proof way?
-
The police has been storing personal data for years – but is it allowed?
The Dutch police force has been deliberately storing personal data relating to millions of Dutch people for many years now. In doing so, the institution has been knowingly breaking the law. Bart Schermer, Professor of Law and Digital Technology expressed his concerns on Follow the Money – a platform…
-
Information Management
The SOLO Information Management department offers assistance in all kinds of matters concerning privacy, information and IT.
-
Contact details
You can contact us daily from 9:00 to 17:00 hrs.
-
Success for Leiser and Yang at BILETA
Dr Mark Leiser, Assistant Professor at eLaw, and Wen-Ting Yang, former Law And Digital technologies student, won the Best Paper award at BILETA, the United Kingdom’s largest tech and legal education conference.
-
Report a potential incident immediately
Imagine you’ve accidentally sent a CV to the wrong email address or left your laptop on the train; a momentary lapse of concentration can result in a data breach or security incident. By responding quickly, we can limit the damage and consequences for privacy: both your own and the university’s. You…
-
Data processing agreement
If you bring in a (new) person who will be processing personal data for you, this person is not allowed to use this information for his or her own purposes. You need to formalise this in a data processing agreement. The university will usually have an agreement in place.
-
Help desks
We want to make it easy for you to do your work at Leiden University. Find out how to submit queries, get help, log issues or request other services.
-
Keep track of the things you save: FGGA's data experts are here to help
Can you account for all the information and data in your possession? How do you deal with personal information? What do you do if there is a data breach? How do you save your data and are you aware of the regulations you need to adhere to while doing so? Where do you go if you are having ICT problems…
-
De gespannen relatie tussen privacy en cybercrime
Inaugural lecture
-
Swifties in PowNed video could take broadcaster to court
A controversial video in which PowNed asks Taylor Swift fans how far they would go for a meet-and-greet with the singer violates portrait rights according to Jeroen ten Voorde in Dutch newspaper ‘NRC’.
-
Think carefully before sharing anything
Sharing data and documents with colleagues or other organisations can be useful, but it can also entail various risks. You should therefore think carefully before sharing anything, and always ask if you’re not sure whether sharing is permitted.
-
Bart Custers on using genealogical DNA in criminal cases
The Public Prosecutor's Office (OM) and the Netherlands Forensic Institute (NFI) want to use private DNA databases for genealogical research in criminal investigations. The method could be used in serious criminal cases that have stalled and it is already being used in investigations abroad. Whether…
-
Bart Custers
Faculteit Rechtsgeleerdheid
-
Book presentation ‘Cybersecurity, Privacy and Data Protection in EU Law’
Lecture
-
Tools and tips for working securely
Curious to find out how you can contribute to a safe working environment? Then keep reading to discover our tips for working securely. They will help you to work more safely in specific situations. This section contains tools and tips to promote safe working habits in specific situations.
-
Bart Custers on BBC News about Uber’s Greyballing
In just over a decade, Uber has revolutionised how we move around our cities. The ride-hailing app was a game-changer: you just tapped your phone and a cab would find you. You even paid through the app. However, some of the Uber’s more controversial practices have triggered the interest of law enforcement,…
-
Storage and data recovery
As a standard, your workplace comes equipped with a limited amount of disk space. We offer a number of options for extending your disk space. In addition, ISSC can help you recover lost files. You can also securely store your files in the cloud via OneDrive and Teams. Whichever storage you use, be aware…
-
Webinar: Check it: work privacy and security smart
Webinar
-
Security
The University aims to ensure a safe and secure (digital) environment. We all share the responsibility for protecting information, ourselves and the University. We encourage you to find out about safe working practices, a safe work environment and secure management of sensitive information. .
-
Microsoft Authenticator
After entering your username and password in Teams, Office 365 and OneDrive, you need to confirm your login through the Microsoft Authenticator app. This is an extra security step (multifactor authentication).
-
Support
The Grant Support Office at the Research Desk provides information and advice on grant opportunities. We also support researchers in the process of developing and writing their grant proposal and guide them through the mandatory administrative matters.
-
Datamanagement
Data management refers to creating, saving, updating, making available, archiving and long-term storage of research data. The final goal of this process is often defined in terms of the FAIR principles: 'Findable, Accessible, Interoperable and Re-usable'.
-
‘Standing Room Only’ at eLaw’s CPDP Panel on 'Dark Patterns and Data-Driven Manipulation'
With the conference circuit slowly reopening after Covid forced almost all academic interactions online, thousands of conference attendees descended on Brussels for Europe’s largest technology conference. eLaw’s annual sponsorship of one of the many CPDP conference panels brought a diverse range of…
-
During your PhD
You have chosen to do a PhD track at the Faculty of Humanities. Doing a PhD's no small feat, what do you need to know when your start conducting research for a PhD?
-
Teaching
Didactic methods and techniques to bring your teaching into practice.
-
Mohammed Raiz Shaffique
Faculteit Rechtsgeleerdheid