777 search results for “privacy identities” in the Staff website
-
Henk te Velde
Faculty of Humanities
-
Vici for Victoria Nyst: 'The history of sign language contributes to identity formation'
Victoria Nyst's love for sign language was sparked when she accidentally ended up at a deaf school while studying African linguistics. The university lecturer has since been awarded a Vici grant to research the history of these languages.
-
NWO Open Competition for research on inclusive religion and identity: 'Impact on LGBTQIA+ community still underexplored'
What is the impact of religion and its discourse on the lives of queer people in countries where LGBTQIA+ individuals are not accepted? University Lecturer Eduardo Alves Vieira wants to know just that. With an NWO-grant, he will take a closer look at the inclusive religion movement in Brazil.
-
Help and support
Are you looking for a contact person, because you for instance have a question about privacy, or you need a ULCN guest or uSis account? Or do you need a manual or application form? Below you will find more information.
-
Malgieri's co-authored paper on PETs presented and published at FAccT Conference 2024
Gianclaudio Malgieri's paper entitled 'The unfair side of Privacy Enhancing Technologies: addressing the trade-offs between PETs and fairness', coauthored with Alessandra Calvi from Vrije Universiteit Brussel and Dimitris Kotzinos from Paris Cergy University, is set to be presented at this week's prestigious…
-
Personal data
As a university employee, you probably work with personal data. That is not just names and telephone numbers – it can also include things like cookies. How can you make sure you are working in a privacy-proof way?
-
Simone van der Hof in podcast on GDPR and children’s rights
In a podcast of the Netherlands Internet Governance Forum (NL GF) and the Safer Internet Centre Nederland, Simone van der Hof, Professor of Law and Digital Technologies at Leiden University and Thijs Hannema, a lawyer at Kennedy van der Laan, discuss online privacy of children.
-
The police has been storing personal data for years – but is it allowed?
The Dutch police force has been deliberately storing personal data relating to millions of Dutch people for many years now. In doing so, the institution has been knowingly breaking the law. Bart Schermer, Professor of Law and Digital Technology expressed his concerns on Follow the Money – a platform…
-
Contact details
You can contact us daily from 9:00 to 17:00 hrs.
-
Information Management
The SOLO Information Management department offers assistance in all kinds of matters concerning privacy, information and IT.
-
Report a potential incident immediately
Imagine you’ve accidentally sent a CV to the wrong email address or left your laptop on the train; a momentary lapse of concentration can result in a data breach or security incident. By responding quickly, we can limit the damage and consequences for privacy: both your own and the university’s. You…
-
Success for Leiser and Yang at BILETA
Dr Mark Leiser, Assistant Professor at eLaw, and Wen-Ting Yang, former Law And Digital technologies student, won the Best Paper award at BILETA, the United Kingdom’s largest tech and legal education conference.
-
Data processing agreement
If you bring in a (new) person who will be processing personal data for you, this person is not allowed to use this information for his or her own purposes. You need to formalise this in a data processing agreement. The university will usually have an agreement in place.
-
Help desks
We want to make it easy for you to do your work at Leiden University. Find out how to submit queries, get help, log issues or request other services.
-
Keep track of the things you save: FGGA's data experts are here to help
Can you account for all the information and data in your possession? How do you deal with personal information? What do you do if there is a data breach? How do you save your data and are you aware of the regulations you need to adhere to while doing so? Where do you go if you are having ICT problems…
-
De gespannen relatie tussen privacy en cybercrime
Inaugural lecture
-
Swifties in PowNed video could take broadcaster to court
A controversial video in which PowNed asks Taylor Swift fans how far they would go for a meet-and-greet with the singer violates portrait rights according to Jeroen ten Voorde in Dutch newspaper ‘NRC’.
-
Think carefully before sharing anything
Sharing data and documents with colleagues or other organisations can be useful, but it can also entail various risks. You should therefore think carefully before sharing anything, and always ask if you’re not sure whether sharing is permitted.
-
Bart Custers
Faculteit Rechtsgeleerdheid
-
Alumnus Asa Splinter: ‘LGBT+ identities are not a burden but a source of inspiration’
Even as a teenager Asa Splinter was determined to study Japanese in Leiden. A HAVO diploma and a change in legislation threatened to throw a spanner in the works, but Asa persevered. After ten years of studying, Asa obtained a master’s degree in Japanese and was nominated for the IHLIA thesis award…
-
Müge Kinacioglu
Faculteit der Sociale Wetenschappen
-
Leila Demarest
Faculteit der Sociale Wetenschappen
-
Book presentation ‘Cybersecurity, Privacy and Data Protection in EU Law’
Lecture
-
Storage and data recovery
As a standard, your workplace comes equipped with a limited amount of disk space. We offer a number of options for extending your disk space. In addition, ISSC can help you recover lost files. You can also securely store your files in the cloud via OneDrive and Teams. Whichever storage you use, be aware…
-
Bart Custers on BBC News about Uber’s Greyballing
In just over a decade, Uber has revolutionised how we move around our cities. The ride-hailing app was a game-changer: you just tapped your phone and a cab would find you. You even paid through the app. However, some of the Uber’s more controversial practices have triggered the interest of law enforcement,…
-
Security
The University aims to ensure a safe and secure (digital) environment. We all share the responsibility for protecting information, ourselves and the University. We encourage you to find out about safe working practices, a safe work environment and secure management of sensitive information. .
-
Microsoft Authenticator
After entering your username and password in Teams, Office 365 and OneDrive, you need to confirm your login through the Microsoft Authenticator app. This is an extra security step (multifactor authentication).
-
Support
The Grant Support Office at the Research Desk provides information and advice on grant opportunities. We also support researchers in the process of developing and writing their grant proposal and guide them through the mandatory administrative matters.
-
Webinar: Check it: work privacy and security smart
Webinar
-
Datamanagement
Data management refers to creating, saving, updating, making available, archiving and long-term storage of research data. The final goal of this process is often defined in terms of the FAIR principles: 'Findable, Accessible, Interoperable and Re-usable'.
-
Using images at Leiden University
Images are an increasingly important part of communication, but how do you choose suitable ones for the website and where can you find them? This page offers tips on finding the right image and what to watch out for.
-
‘Standing Room Only’ at eLaw’s CPDP Panel on 'Dark Patterns and Data-Driven Manipulation'
With the conference circuit slowly reopening after Covid forced almost all academic interactions online, thousands of conference attendees descended on Brussels for Europe’s largest technology conference. eLaw’s annual sponsorship of one of the many CPDP conference panels brought a diverse range of…
-
During your PhD
You have chosen to do a PhD track at the Faculty of Humanities. Doing a PhD's no small feat, what do you need to know when your start conducting research for a PhD?
-
Teaching
Didactic methods and techniques to bring your teaching into practice.
-
Mohammed Raiz Shaffique
Faculteit Rechtsgeleerdheid
-
Compulsory identification
The Compulsory Identification Act (WID) stipulates that employers must establish the identity of employees when they enter their employment. This also applies for employment agency staff and interns. When you start work at the University, you therefore have to show a valid identity document. A copy…
-
Research using personal data
If your research project involves collecting private or otherwise sensitive data, you must ensure adequate data protection measures are taken. Research must be conducted in accordance with the General Data Protection Regulation (GDPR). In terms of patient data, for instance, when used for research carried…
-
Do you work with personal data? Help us map our processes
Organisation, Security
- Zoom
-
Research Support @ FSW
We are a multidisciplinary network that advises and guides FSW researchers at every stage of their research journey.
-
Summer School on Sexual Orientation & Gender Identity in International Law
Summerschool
-
Microsoft Teams
Microsoft Teams lets you work remotely. You can chat, meet, call and collaborate with your colleagues. Check out tips on how to get started with Teams quickly and easily.
-
Microsoft Teams
With Microsoft Teams you can work online from home. You can chat with colleagues, have meetings, call and collaborate remotely. The following suggestions should help you to quickly get started with Teams.
-
‘The gatekeepers’ van het internet; waarom een ‘gratis’ internet niet bestaat
Of je nu appt, online nieuws leest, of door Instagram scrolt, jouw gedrag wordt gemonitord. Sterker nog: wát jij ziet, wordt door anderen bepaald. Promovendus Aleksandre Zardiashvili onderzocht de impact van online advertenties en de macht van de bedrijven erachter.
-
Eduardo Alves Vieira
Faculty of Humanities
-
Prevent children becoming victims of a data-driven world
It is becoming increasingly common to collect data from children and young people through digital means. The impact of this so-called ‘dataveillance’ on children, who are monitored from birth via smartphones and Fitbits, is great.
-
Profiling Objects, Finding Identities?
Lecture, Material Culture Talk
-
Shopping by appointment: What happens to your personal data?
In the Netherlands it is now possible to visit non-essential shops if you make an appointment beforehand. But when you book an appointment you have to provide a lot of personal data. Are shops allowed to ask you for all this data and what happens to it?
-
Bart Schermer about attack on citizens' right to demonstrate
Media outlets Investico, de Groene Amsterdammer and Trouw reported on the wide-scale collection by the Dutch police of personal data of demonstrators and their family members. Bart Schermer, Professor of Privacy and Cybercrime, commented on the issue.
-
Tinder match? Use facial recognition first
Recent developments in AI mean nobody is anonymous nowadays. The search engine PimEyes can find any photo of anyone that’s ever been placed online. No more Tinder Swindlers… or personal privacy. Everyone’s findable now. But is that even allowed?