469 search results for “online privacy” in the Staff website
-
Gianclaudio Malgieri appointed to the Programme Committee of PLSC
Gianclaudio Malgieri, Associate Professor of Law and Board member at eLaw, has been appointed to the Programme Committee of PLSC, the Privacy Law Scholarship Conference, one of the world's most attended academic privacy conferences. Gianclaudio is the only representative from a Dutch university and…
-
Gera van Duijvenvoorde
Faculteit Rechtsgeleerdheid
-
Wouter Hins
Faculteit Rechtsgeleerdheid
-
Eleftheria Makri
Science
-
Oliver Tuazon
Faculteit Rechtsgeleerdheid
-
Daniel Vale
Faculteit Rechtsgeleerdheid
-
Els Kindt
Faculteit Rechtsgeleerdheid
-
Bart Schermer
Faculteit Rechtsgeleerdheid
-
How to make cryptographic techniques more efficient?
Sharing scientific data, transferring money, or sending other sensitive information online: with cryptography, applications make sure your data does not fall into the wrong hands. Mathematician Thomas Attema (CWI/TNO/Leiden University) helps with this. For his PhD research, he developed a new technique…
-
'AIVD loopt risico's door het gebruik van Israëlische hacksoftware'
De AIVD gebruikt omstreden hacksoftware van de Israëlische leverancier NSO Group, meldde de Volkskrant. In 2019 zou de telefoon van topcriminineel Ridouan Taghi er mee gehackt zijn.
-
'GDPR is no excuse for not tracing children placed in care'
The GDPR privacy legislation is no impediment to handing out sanctions to Russian oligarchs or reuniting children placed in care with their parents, says privacy experts Anna Berlee, Marlies van Eck, Simone van der Hof, Simone Huting, Friederike van der Jagt and Jeroen Terstegge.
-
Outcome report for 2nd Expert Workshop on the EU Proposed Regulation on Online Child Sexual Abuse published
Workshop brings multidisciplinary experts together to debate proposed detection technologies and their impact on fundamental rights.
-
Data processing register
A data processing register is a record of which personal data you process and who you share this data with. If you collect personal data for your research, you must record this in the data processing register.
-
‘Supervision of the fight against cybercrime is poorly regulated'
Investigation services and cyber criminals both make grateful use of the opportunities offered by digital technologies. Both groups' use of these services leads to breaches of privacy for citizens. The current legislation falls short in providing protective measures, is the conclusion reached by Professor…
-
Malgieri's co-authored paper on PETs presented and published at FAccT Conference 2024
Gianclaudio Malgieri's paper entitled 'The unfair side of Privacy Enhancing Technologies: addressing the trade-offs between PETs and fairness', coauthored with Alessandra Calvi from Vrije Universiteit Brussel and Dimitris Kotzinos from Paris Cergy University, is set to be presented at this week's prestigious…
-
Help and support
Are you looking for a contact person, because you for instance have a question about privacy, or you need a ULCN guest or uSis account? Or do you need a manual or application form? Below you will find more information.
-
Alan Sears
Faculteit Rechtsgeleerdheid
-
Eduard Fosch Villaronga
Faculteit Rechtsgeleerdheid
-
Personal data
As a university employee, you probably work with personal data. That is not just names and telephone numbers – it can also include things like cookies. How can you make sure you are working in a privacy-proof way?
- KNIR Online Open Day
-
Storage and data recovery
As a standard, your workplace comes equipped with a limited amount of disk space. We offer a number of options for extending your disk space. In addition, ISSC can help you recover lost files. You can also securely store your files in the cloud via OneDrive and Teams. Whichever storage you use, be aware…
-
Information Management
The SOLO Information Management department offers assistance in all kinds of matters concerning privacy, information and IT.
-
Report a potential incident immediately
Imagine you’ve accidentally sent a CV to the wrong email address or left your laptop on the train; a momentary lapse of concentration can result in a data breach or security incident. By responding quickly, we can limit the damage and consequences for privacy: both your own and the university’s. You…
-
The Awaretrain learning platform
Do you want to improve your knowledge about privacy and working securely? And make sure that you never get caught out by a phishing e-mail, and that your passwords are strong? Then start working through the cybersecurity and privacy e-learning modules on Awaretrain.
-
Keep track of the things you save: FGGA's data experts are here to help
Can you account for all the information and data in your possession? How do you deal with personal information? What do you do if there is a data breach? How do you save your data and are you aware of the regulations you need to adhere to while doing so? Where do you go if you are having ICT problems…
-
Data processing agreement
If you bring in a (new) person who will be processing personal data for you, this person is not allowed to use this information for his or her own purposes. You need to formalise this in a data processing agreement. The university will usually have an agreement in place.
-
Swifties in PowNed video could take broadcaster to court
A controversial video in which PowNed asks Taylor Swift fans how far they would go for a meet-and-greet with the singer violates portrait rights according to Jeroen ten Voorde in Dutch newspaper ‘NRC’.
-
De gespannen relatie tussen privacy en cybercrime
Inaugural lecture
-
Mail migration to Exchange Online
ICT
-
Succesful online conference: Imperial Artefacts
On January 28 and 29, 2021 the conference ‘Imperial Artefacts: History, Law and the Looting of Cultural Property’ took place online. This first of its kind event at Leiden University was an interdisciplinary online conference and brought together (post-)colonial historians, legal historians, curators,…
-
Think carefully before sharing anything
Sharing data and documents with colleagues or other organisations can be useful, but it can also entail various risks. You should therefore think carefully before sharing anything, and always ask if you’re not sure whether sharing is permitted.
-
Bart Custers on using genealogical DNA in criminal cases
The Public Prosecutor's Office (OM) and the Netherlands Forensic Institute (NFI) want to use private DNA databases for genealogical research in criminal investigations. The method could be used in serious criminal cases that have stalled and it is already being used in investigations abroad. Whether…
-
ESOF2022 Online mini-symposium: The effect of the online world on adolescents
How do digital technologies affect adolescent mental health and resilience? How do we foster a secure online environment? How should we deal with increasing rates of online crimes among adolescents? During the mini-symposium ‘The effect of the online world on adolescents’, presented by the interdisciplinary…
-
Sander Hölsgens in NRC about the online game The Elder Scrolls Online
Sander Hölsgens is Assistant Professor, anthropologist and the editor of Gamer.nl. In NRC he talks about his favourite moments in the online game The Elder Scrolls Online. Despite a mediocre start in 2014, the computer game based on the Elder Scrolls series now has an active community of millions of…
-
Online lecture: consent in research
Lecture
-
Online safety: automatic forwarding to external email addresses no longer permitted
ICT
-
Display information clearly using Visio Online
ICT
-
Personal and professional development online: but how?
We can all look back on a turbulent year, a year in which we rapidly switched to working – and learning – online. Because pandemic or not, many staff members have continued to work on their development. Last year the Learning & Development team developed a wide range of online courses and training,…
-
Book presentation ‘Cybersecurity, Privacy and Data Protection in EU Law’
Lecture
-
Trial access to Globe Law Online
Library
-
Bart Custers
Faculteit Rechtsgeleerdheid
-
‘Standing Room Only’ at eLaw’s CPDP Panel on 'Dark Patterns and Data-Driven Manipulation'
With the conference circuit slowly reopening after Covid forced almost all academic interactions online, thousands of conference attendees descended on Brussels for Europe’s largest technology conference. eLaw’s annual sponsorship of one of the many CPDP conference panels brought a diverse range of…
-
Research using personal data
If your research project involves collecting private or otherwise sensitive data, you must ensure adequate data protection measures are taken. Research must be conducted in accordance with the General Data Protection Regulation (GDPR). In terms of patient data, for instance, when used for research carried…
-
Security
The University aims to ensure a safe and secure (digital) environment. We all share the responsibility for protecting information, ourselves and the University. We encourage you to find out about safe working practices, a safe work environment and secure management of sensitive information. .
-
Support
The Grant Support Office at the Research Desk provides information and advice on grant opportunities. We also support researchers in the process of developing and writing their grant proposal and guide them through the mandatory administrative matters.
-
Microsoft Authenticator
After entering your username and password in Teams, Office 365 and OneDrive, you need to confirm your login through the Microsoft Authenticator app. This is an extra security step (multifactor authentication).
-
Results of first online strategic plan dialogue
One of the aims in the development of the university’s new strategic plan is to foster a dialogue between as many students, staff and external stakeholders as possible about which topics and ambitions should be included in the plan. At the beginning of May we therefore invited all our students and staff…
-
Datamanagement
Data management refers to creating, saving, updating, making available, archiving and long-term storage of research data. The final goal of this process is often defined in terms of the FAIR principles: 'Findable, Accessible, Interoperable and Re-usable'.
-
Mail migration from Outlook to Exchange Online
ICT
-
Sign up for the online Veni meeting
Research