186 search results for “privacy by design” in the Staff website
-
Joost Batenburg
Science
-
Roozbeh Siyadatzadeh
Science
-
Julian Steinke
Faculteit der Sociale Wetenschappen
-
Dirk Visser
Faculteit Rechtsgeleerdheid
-
Lina van Drunen
Faculteit der Sociale Wetenschappen
-
How to make cryptographic techniques more efficient?
Sharing scientific data, transferring money, or sending other sensitive information online: with cryptography, applications make sure your data does not fall into the wrong hands. Mathematician Thomas Attema (CWI/TNO/Leiden University) helps with this. For his PhD research, he developed a new technique…
-
Gera van Duijvenvoorde
Faculteit Rechtsgeleerdheid
-
Wouter Hins
Faculteit Rechtsgeleerdheid
-
Carlotta Rigotti
Faculteit Rechtsgeleerdheid
-
Eleftheria Makri
Science
-
Oliver Tuazon
Faculteit Rechtsgeleerdheid
-
Daniel Vale
Faculteit Rechtsgeleerdheid
-
Els Kindt
Faculteit Rechtsgeleerdheid
-
Bart Schermer
Faculteit Rechtsgeleerdheid
-
Design METIS instrument for the Extremely Large Telescope finalised
The design for the METIS instrument for the Extremely Large Telescope (ELT) is final. The European Southern Observatory (ESO) has given the green light for production of all parts of the instrument. It is the first ELT instrument, designed and to be built under Dutch leadership, to formally pass the…
-
Jaap Reijling
Faculty Governance and Global Affairs
-
Data processing register
A data processing register is a record of which personal data you process and who you share this data with. If you collect personal data for your research, you must record this in the data processing register.
-
Cybersecurity: how can you reduce the risk of reputational damage to the University?
ICT
-
Help and support
Are you looking for a contact person, because you for instance have a question about privacy, or you need a ULCN guest or uSis account? Or do you need a manual or application form? Below you will find more information.
-
Personal data
As a university employee, you probably work with personal data. That is not just names and telephone numbers – it can also include things like cookies. How can you make sure you are working in a privacy-proof way?
-
Eduard Fosch Villaronga
Faculteit Rechtsgeleerdheid
-
Alan Sears
Faculteit Rechtsgeleerdheid
-
Report a potential incident immediately
Imagine you’ve accidentally sent a CV to the wrong email address or left your laptop on the train; a momentary lapse of concentration can result in a data breach or security incident. By responding quickly, we can limit the damage and consequences for privacy: both your own and the university’s. You…
-
The Awaretrain learning platform
Do you want to improve your knowledge about privacy and working securely? And make sure that you never get caught out by a phishing e-mail, and that your passwords are strong? Then start working through the cybersecurity and privacy e-learning modules on Awaretrain.
-
Data processing agreement
If you bring in a (new) person who will be processing personal data for you, this person is not allowed to use this information for his or her own purposes. You need to formalise this in a data processing agreement. The university will usually have an agreement in place.
-
Corrugated plastic unveils a new design principle for programmable materials
Martin van Hecke en Anne Meeussen publiceren in het tijdschrift Nature over mechanische metamaterialen. Ze hebben een nieuwe klasse multistabiele materialen ontdekt. Dit is gebaseerd op ribbeltjes plastic.
-
Think carefully before sharing anything
Sharing data and documents with colleagues or other organisations can be useful, but it can also entail various risks. You should therefore think carefully before sharing anything, and always ask if you’re not sure whether sharing is permitted.
-
Randal Sheppard
Faculty of Humanities
-
Juan Masullo Jimenez
Faculteit der Sociale Wetenschappen
-
Designing the quantum future on a regular computer
Computer scientist Tim Coopmans uses pen, paper and regular computers to simulate the best possible quantum computer. He tells about his research and how this helps make a useful quantum computer a reality a little bit sooner. ‘I hope I will get to see quantum computers contributing something really…
-
Storage and data recovery
As a standard, your workplace comes equipped with a limited amount of disk space. We offer a number of options for extending your disk space. In addition, ISSC can help you recover lost files. You can also securely store your files in the cloud via OneDrive and Teams. Whichever storage you use, be aware…
-
Security
The University aims to ensure a safe and secure (digital) environment. We all share the responsibility for protecting information, ourselves and the University. We encourage you to find out about safe working practices, a safe work environment and secure management of sensitive information. .
-
Microsoft Authenticator
After entering your username and password in Teams, Office 365 and OneDrive, you need to confirm your login through the Microsoft Authenticator app. This is an extra security step (multifactor authentication).
-
Gavin Robinson
Faculteit Rechtsgeleerdheid
-
Irith Kist
Faculteit Rechtsgeleerdheid
-
Bart Custers
Faculteit Rechtsgeleerdheid
-
Tools and tips for working securely
Curious to find out how you can contribute to a safe working environment? Then keep reading to discover our tips for working securely. They will help you to work more safely in specific situations. This section contains tools and tips to promote safe working habits in specific situations.
- Zoom
-
Research using personal data
If your research project involves collecting private or otherwise sensitive data, you must ensure adequate data protection measures are taken. Research must be conducted in accordance with the General Data Protection Regulation (GDPR). In terms of patient data, for instance, when used for research carried…
-
Data storage
Your options for data storage may vary depending on factors such as size and sensitivity of the data or collaboration with partners outside the university. We are all responsible for data protection. To keep (personal) data as secure as possible, the university has established an information security…
-
Security
All university locations and buildings are monitored and fitted with cameras. Read on to find out where to get advice about security for a building, person or event that may be at higher risk.
-
One-off data processing
Are you handling personal data just once, for instance when taking the minutes of a meeting or organising an employee outing? You do not need to include this use in the data processing register if you stick to the following conditions.
-
Nursing mothers' rooms Pieter de la Court Building
Pieter de la Court, Wassenaarseweg 52, 2333 AK, Leiden
-
Graduate School FGGA: Research data management course
Didactics, Career development
-
research, development and assessment in the areas of AI, security and privacy.
Lecture
-
Sabine Witting
Faculteit Rechtsgeleerdheid
-
Factsheet Zoom
Zoom is available to LEI lecturers, staff and students.
-
Deleting personal data
Individuals have the right to instruct the university to delete their personal data in a number of cases. For instance, if the university no longer needs the data, or if the person withdraws consent previously given.
-
Projects 2024-2025
This academic year, seven (teams of) teachers will receive a Grassroots or Grass shoots grant. Here you can read about their projects.
-
How to design a course (UTQ module)
Didactics