335 search results for “privacy identiteit” in the Staff website
- Zoom
-
Research Support @ FSW
We are a multidisciplinary network that advises and guides FSW researchers at every stage of their research journey.
-
Mohammed Raiz Shaffique
Faculteit Rechtsgeleerdheid
-
‘The gatekeepers’ van het internet; waarom een ‘gratis’ internet niet bestaat
Of je nu appt, online nieuws leest, of door Instagram scrolt, jouw gedrag wordt gemonitord. Sterker nog: wát jij ziet, wordt door anderen bepaald. Promovendus Aleksandre Zardiashvili onderzocht de impact van online advertenties en de macht van de bedrijven erachter.
-
Prevent children becoming victims of a data-driven world
It is becoming increasingly common to collect data from children and young people through digital means. The impact of this so-called ‘dataveillance’ on children, who are monitored from birth via smartphones and Fitbits, is great.
-
Shopping by appointment: What happens to your personal data?
In the Netherlands it is now possible to visit non-essential shops if you make an appointment beforehand. But when you book an appointment you have to provide a lot of personal data. Are shops allowed to ask you for all this data and what happens to it?
-
Bart Schermer about attack on citizens' right to demonstrate
Media outlets Investico, de Groene Amsterdammer and Trouw reported on the wide-scale collection by the Dutch police of personal data of demonstrators and their family members. Bart Schermer, Professor of Privacy and Cybercrime, commented on the issue.
-
Tinder match? Use facial recognition first
Recent developments in AI mean nobody is anonymous nowadays. The search engine PimEyes can find any photo of anyone that’s ever been placed online. No more Tinder Swindlers… or personal privacy. Everyone’s findable now. But is that even allowed?
-
Bart Custers on successor to DigiD
The Netherlands has DigiD, Portugal ‘de Cartão de Cidadão’, and Ireland MyGovID. Europe now wants one uniform digital identity card - the same for all Member States. For the Dutch government, the European successor to DigiD is a prestige project. State Secretary Van Huffelen wants to roll out an app…
-
Personal and sensitive data
Collecting personal and sensitive data is not as common an issue in archaeological research as in some other fields such as sociology and political sciences which is often the reason why archaeologists might not be aware that they are handling those types of data.
-
Open Science and archiving
Slowly but surely Open Science is becoming a standard in scholarly research, making it more open, collaborative, transparent, and after all FAIR, from its planning stages to publishing and re-use of data.
-
Project Management
Create an inventory of all the people/roles (potentially) involved in the research project, including their roles and responsibilities (concerning the research data), as well as how they relate to the university.
-
EU Privacy and Data Protection Law applied to AI: Unveiling the Legal Problems for Individuals
PhD defence
-
Sabine Witting
Faculteit Rechtsgeleerdheid
- Space for academic debate: security at universities
-
Data storage
Your options for data storage may vary depending on factors such as size and sensitivity of the data or collaboration with partners outside the university. We are all responsible for data protection. To keep (personal) data as secure as possible, the university has established an information security…
-
One-off data processing
Are you handling personal data just once, for instance when taking the minutes of a meeting or organising an employee outing? You do not need to include this use in the data processing register if you stick to the following conditions.
-
Nursing mothers' rooms Pieter de la Court Building
Pieter de la Court, Wassenaarseweg 52, 2333 AK, Leiden
-
Open Access and access rights
Complete open access may not be possible because of various reasons: research ethics, privacy legislation, intellectual property, continuing research. The Easy archive at KNAW/DANS provides various access levels to deal with these issues.
-
Graduate School FGGA: Research data management course
Didactics, Career development
-
Forms and regulations
The PhD Regulations are established by the Doctorate Board. The regulations set out who is eligible to be a PhD candidate, what the tasks of the supervisor and co-supervisor are and which criteria the dissertation has to meet.
- Events
-
Bart Custers in Trouw about new European digital identity
Europe is working full steam towards a digital identity for every EU citizen. And although it might be really useful to be able to hire a car everywhere in the EU with no hassles, Bart Custers, Professor of Law and Data Science at eLaw, the Center for Law and Digital Technologies, sees many loose ends.…
-
research, development and assessment in the areas of AI, security and privacy.
Lecture
-
Factsheet Zoom
Zoom is available to LEI lecturers, staff and students.
-
Deleting personal data
Individuals have the right to instruct the university to delete their personal data in a number of cases. For instance, if the university no longer needs the data, or if the person withdraws consent previously given.
-
Camera surveillance
Whether you’re a student, staff member or external service provider, it’s important that you feel safe at Leiden University. A range of measures are in place to assure safety and security in all the university’s buildings and grounds.
-
Simone van der Hof
Faculteit Rechtsgeleerdheid
-
Bart Custers on DNA in cold cases
The Dutch Public Prosecution Service (OM) and the Netherlands Forensic Institute (NFI) want to use private DNA databases in an effort to solve deadlocked murder cases. Bart Custers, Professor of Law & Data Science at eLaw, Center for Law and Digital Technologies, expects that this is permissible from…
-
What to archive?
Start thinking in advance about the selection for long-term preservation.
-
ICT
Good ICT resources are crucial for having a smooth working environment at your new place of employment. Here we briefly explain what you need and where you can find the most important ICT services.
-
2025 SGOA/Hans Franken Thesis Prize
Education
-
Data Protection Day: are you keeping personal data safe?
Security
-
‘Technology shouldn’t shape our future; we should’
Technology holds so much promise – from self-driving cars to enhanced physical performance from smart implants under the skin. But we should not let ourselves be caught off guard. That is the message of Bart Custers, Professor of Law and Data Science in his inaugural lecture on 21 May. ‘We don’t talk…
-
Update on internal and external cameras at KOG
Facility, Security
-
Online security: be vigilant with free services
ICT
- Cybersecurity month: Follow good information security practices
-
Anne Meuwese and Bart Custers in Trouw on Covid apps
The more people are vaccinated, the more society can slowly reopen. Technological developments, like the Covid passport and other apps, can play a role in this. Artificial Intelligence could help greatly in developing the vaccine passport and the Covid-19 exposure notification app, Anne Meuwese and…
-
Bram Klievink in Trouw over dataprivacy
Last weekend, an article on data privacy appeared in Trouw. In this essay, Bram Klievink, Professor of Digitization and Public Policy at the FGGA, addresses the issue of data privacy. What are the downsides of the rules the tech giants have to abide by?
-
Using images at Leiden University
Images are an increasingly important part of communication, but how do you choose suitable ones for the website and where can you find them? This page offers tips on finding the right image and what to watch out for.
-
(Personal) mobile devices
If you have a mobile device such as a smart phone or tablet that you purchased privately but also use for work-related purposes, it is important that you save your documents securely and deal responsibly with confidential information.
-
Editing room 1A45
Want to edit video, photo and audio material with Adobe Creative Cloud apps? You can do so on the computers in editing room 1A45.
-
Organising online events
The Events Office is happy to help organise an online event, but you can also do it yourself. You will find resources and support for this on this page.
-
Social media
Social media is a good way to meet others or to hear about the latest news and developments. It is an excellent way to tell people about what you are doing and to hear what they are up to too. But social media also has its downsides: disinformation, trolling, disrespectful comments and even the misuse…
-
Research funding
Leiden University offers a broad range of support for finding, writing, and applying for research funding. The first point of contact is your local grant adviser at your faculty/institute, who can guide you through the application process and answer any questions you may have. If your faculty/institute…
-
Margot Kaminski presenting at eLaw on 6 March
On Wednesday 6 March, eLaw - Center for Law and Digital Technologies will be hosting Professor Margot Kaminski, an eminent scholar from Colorado Law School, for a research morning on her new paper on Participatory Data Governance, co-authored with Dr Gianclaudio Malgieri, Associate Professor at eL…
-
Using health data for scientific research isn’t that simple
While health data is essential for scientific research, that data also needs to be protected. In her doctoral thesis, Irith Kist found a balance between protecting the individual and exchanging health data.
-
Data breach public groups in SharePoint/Teams
Security
-
eLaw Alumnus wins European Data Protection Law Review ‘Young Scholar Award’ at CPDP
Taner Kuru, an eLaw alumnus, was awarded the prestigious European Data Protection Law Review ‘Young Scholar Award’ for his paper on the shortcomings in the GDPR for the regulation of genetic testing at the prestigious Computers, Privacy and Data Protection Conference (CPDP).
-
Article on Affective Computing by Andreas Häuselmann published in IDPL
Affective Computing (AC and sometimes called ‘Emotional AI’) provides opportunities to automatically process emotional data. However, is EU data protection law fit for purpose when it is applied to such AC approaches?