376 search results for “data or hart haring” in the Staff website
-
Bas Haring
Science
-
Yvonne Haring
Faculteit Archeologie
-
Ben Haring
Faculty of Humanities
-
Stephen Hart
Universitaire Bibliotheken Leiden
-
James Hart
Faculty of Humanities
-
Emiel van der Hart
ICLON
-
Sophie 't Hart
Expertisecentrum SOZ
-
Marco van 't Hart
Universitair Facilitair Bedrijf
-
Joest 't Hart
Faculteit Rechtsgeleerdheid
-
Leendert 't Hart
Faculteit Geneeskunde
-
Petra 't Hart
Faculty of Humanities
-
Kim van der Hart
Faculteit der Sociale Wetenschappen
-
Jeroen 't Hart
Expertisecentrum SOZ
-
Data storage
Your options for data storage may vary depending on factors such as size and sensitivity of the data or collaboration with partners outside the university. We are all responsible for data protection. To keep (personal) data as secure as possible, the university has established an information security…
-
Personal and sensitive data
Collecting personal and sensitive data is not as common an issue in archaeological research as in some other fields such as sociology and political sciences which is often the reason why archaeologists might not be aware that they are handling those types of data.
-
Deleting personal data
Individuals have the right to instruct the university to delete their personal data in a number of cases. For instance, if the university no longer needs the data, or if the person withdraws consent previously given.
-
Jopie van der Hart-van der Hoek
Science
-
Mariëlle Linting
Faculteit der Sociale Wetenschappen
-
Data management, privacy and data protection
As a PhD candidate, you work with data. To keep (personal) data as secure as possible, the university has established an information security policy.
-
Personal data
As a university employee, you probably work with personal data. That is not just names and telephone numbers – it can also include things like cookies. How can you make sure you are working in a privacy-proof way?
-
Structuring data
When structured properly, the data are easier to manipulate, analyze and visualize.
-
Data stewards
Do you have questions about data management? Please contact the data stewards:
-
Privacy and data breaches
Any loss of control over stored personal data constitutes a potential data leak. In most cases this concerns stolen (or lost) digital files, but a stolen (or mislaid) printed list containing personal data also represents a data leak. It is important that you report any data leak.
-
Data processing register
A data processing register is a record of which personal data you process and who you share this data with. If you collect personal data for your research, you must record this in the data processing register.
-
Data processing agreement
If you bring in a (new) person who will be processing personal data for you, this person is not allowed to use this information for his or her own purposes. You need to formalise this in a data processing agreement. The university will usually have an agreement in place.
-
Research using personal data
If your research project involves collecting private or otherwise sensitive data, you must ensure adequate data protection measures are taken. Research must be conducted in accordance with the General Data Protection Regulation (GDPR). In terms of patient data, for instance, when used for research carried…
-
Data Management for Archaeologists
Course, Workshop
-
Data Science Research Programme
Universities, companies, organisations and societies are increasingly facing enormous quantities of data. It is a great challenge to transform these Big Data into knowledge, which is why Leiden University has launched a University-wide Data Science Research Programme.
-
Privacy and data protection
We are all responsible for data protection. To keep (personal) data as secure as possible, the university has established an information security policy.
-
Make your data FAIR
Contemporary data management practices rest on the four principles: findability, accessibility, interoperability, and reusability.
-
Data Management Plan
Firstly, Data Management Plan (DMP) is after all a plan, so you must carry it out!
-
Storage and data recovery
As a standard, your workplace comes equipped with a limited amount of disk space. We offer a number of options for extending your disk space. In addition, ISSC can help you recover lost files. You can also securely store your files in the cloud via OneDrive and Teams. Whichever storage you use, be aware…
- Research Data Management
-
One-off data processing
Are you handling personal data just once, for instance when taking the minutes of a meeting or organising an employee outing? You do not need to include this use in the data processing register if you stick to the following conditions.
-
Research Data Management in Archaeology
Doing research in archaeology is more than just gathering data and publishing a paper. Nowadays, there is a growing trend in producing well-defined and responsible data management plans. They help to navigate the process and result in good data management practices which in return benefit the researchers…
-
Personal data: privacy and the GDPR
As an employee of Leiden University, you probably work with or come into contact with personal data. The concept of ‘personal data’ is core to the General Data Protection Regulation (GDPR). If you work with personal data, you must be able to explain clearly, comprehensively and in simple language how…
-
Graduation Ceremony Statistics & Data Science
Graduation Ceremony
-
Laura Zwep
Science
-
Peter Grünwald
Science
-
Marta Fiocco
Science
-
Gino Bertrand Kpogbezan
Science
-
Kevin Duisters
Science
-
Jelle Goeman
Faculteit Geneeskunde
-
Thijs Bos
Science
-
Graduate School FGGA: Research data management course
Didactics, Career development
-
Pieter Kroonenberg
Faculteit der Sociale Wetenschappen
-
Oliver Tuazon
Faculteit Rechtsgeleerdheid
-
Multilevel and Longitudinal Data Analysis (basic)
-
Bibliometric Data Sources and Indicators (online)
Research
-
Data storage
Your options for data storage may vary depending on factors such as size and sensitivity of the data or collaboration with partners outside the university. We are all responsible for data protection. To keep (personal) data as secure as possible, the university has established an information security…