366 search results for “privacy by design” in the Staff website
-
Keep track of the things you save: FGGA's data experts are here to help
Can you account for all the information and data in your possession? How do you deal with personal information? What do you do if there is a data breach? How do you save your data and are you aware of the regulations you need to adhere to while doing so? Where do you go if you are having ICT problems…
-
Report a potential incident immediately
Imagine you’ve accidentally sent a CV to the wrong email address or left your laptop on the train; a momentary lapse of concentration can result in a data breach or security incident. By responding quickly, we can limit the damage and consequences for privacy: both your own and the university’s. You…
-
Information Management
The SOLO Information Management department offers assistance in all kinds of matters concerning privacy, information and IT.
-
The Awaretrain learning platform
Do you want to improve your knowledge about privacy and working securely? And make sure that you never get caught out by a phishing e-mail, and that your passwords are strong? Then start working through the cybersecurity and privacy e-learning modules on Awaretrain.
-
Data processing agreement
If you bring in a (new) person who will be processing personal data for you, this person is not allowed to use this information for his or her own purposes. You need to formalise this in a data processing agreement. The university will usually have an agreement in place.
-
De gespannen relatie tussen privacy en cybercrime
Inaugural lecture
-
Corrugated plastic unveils a new design principle for programmable materials
Martin van Hecke en Anne Meeussen publiceren in het tijdschrift Nature over mechanische metamaterialen. Ze hebben een nieuwe klasse multistabiele materialen ontdekt. Dit is gebaseerd op ribbeltjes plastic.
-
Bart Custers on using genealogical DNA in criminal cases
The Public Prosecutor's Office (OM) and the Netherlands Forensic Institute (NFI) want to use private DNA databases for genealogical research in criminal investigations. The method could be used in serious criminal cases that have stalled and it is already being used in investigations abroad. Whether…
-
Think carefully before sharing anything
Sharing data and documents with colleagues or other organisations can be useful, but it can also entail various risks. You should therefore think carefully before sharing anything, and always ask if you’re not sure whether sharing is permitted.
-
The Design-Thinking method for stimulating knowledge transfer in organisations
Sharing knowledge based on research within organisations presents a challenging task. How can this be done effectively? What steps should be taken to ensure that knowledge obtained from research is shared and applied in the organisation's daily practice? On 8 May, the Leiden Leadership Centre (LLC)…
-
Randal Sheppard
Faculty of Humanities
-
Juan Masullo Jimenez
Faculteit der Sociale Wetenschappen
-
Book presentation ‘Cybersecurity, Privacy and Data Protection in EU Law’
Lecture
-
Bart Custers on BBC News about Uber’s Greyballing
In just over a decade, Uber has revolutionised how we move around our cities. The ride-hailing app was a game-changer: you just tapped your phone and a cab would find you. You even paid through the app. However, some of the Uber’s more controversial practices have triggered the interest of law enforcement,…
-
Code for children’s rights: Designing technology with children in mind
On Friday 12 March 2021, the (Dutch) website www.codevoorkinderrechten.nl was launched. This code for children’s rights has been created to help those involved in the development and design of digital services to develop these services with the interests of children in mind.
-
Simone van der Hof in online talk show about Behavioral Design in Video Games
On 7 October 2021 Simone van der Hof participated in an online talk show as part of the Dutch Media Week. The theme was the research project she is working on with Tony van Rooij of the Trimbos Institute and Max Birk of TU Eindhoven: Behavioral Design in Video Games.
-
Designing the quantum future on a regular computer
Computer scientist Tim Coopmans uses pen, paper and regular computers to simulate the best possible quantum computer. He tells about his research and how this helps make a useful quantum computer a reality a little bit sooner. ‘I hope I will get to see quantum computers contributing something really…
-
Lecture Simone van der Hof on age verification and age appropriate design
On 6 October 2021, Simone van der Hof gave a lecture on age verification and age appropriate design.
-
Storage and data recovery
As a standard, your workplace comes equipped with a limited amount of disk space. We offer a number of options for extending your disk space. In addition, ISSC can help you recover lost files. You can also securely store your files in the cloud via OneDrive and Teams. Whichever storage you use, be aware…
-
‘Standing Room Only’ at eLaw’s CPDP Panel on 'Dark Patterns and Data-Driven Manipulation'
With the conference circuit slowly reopening after Covid forced almost all academic interactions online, thousands of conference attendees descended on Brussels for Europe’s largest technology conference. eLaw’s annual sponsorship of one of the many CPDP conference panels brought a diverse range of…
-
Security
The University aims to ensure a safe and secure (digital) environment. We all share the responsibility for protecting information, ourselves and the University. We encourage you to find out about safe working practices, a safe work environment and secure management of sensitive information. .
-
Support
The Grant Support Office at the Research Desk provides information and advice on grant opportunities. We also support researchers in the process of developing and writing their grant proposal and guide them through the mandatory administrative matters.
-
Microsoft Authenticator
After entering your username and password in Teams, Office 365 and OneDrive, you need to confirm your login through the Microsoft Authenticator app. This is an extra security step (multifactor authentication).
-
Gianclaudio Malgieri will give keynote speech on Fundamental Rights and Vulnerability at Maastricht University
Dr. Gianclaudio Malgieri, Associate Professor of Law & Technology at eLaw, and Co-Director of the Brussels Privacy Hub, will deliver a keynote speech at Maastricht University. This keynote is a part of the Maastricht Experience Week, which focuses on the "Future of Privacy, Cybersecurity, and Data Management."…
-
Datamanagement
Data management refers to creating, saving, updating, making available, archiving and long-term storage of research data. The final goal of this process is often defined in terms of the FAIR principles: 'Findable, Accessible, Interoperable and Re-usable'.
-
Gavin Robinson
Faculteit Rechtsgeleerdheid
-
Irith Kist
Faculteit Rechtsgeleerdheid
-
Bart Custers
Faculteit Rechtsgeleerdheid
-
Home magazines of yesteryear: Upholsterers were the interior designers of the eighteenth century'
Today, anyone wanting a new look for their living room watches a home decorating programme or buys an interior design magazine. In the eighteenth century, people went to an upholstry specialist, who would provide you with new wall coverings, curtains and much-needed accessories. PhD candidate Aagje…
-
During your PhD
You have chosen to do a PhD track at the Faculty of Humanities. Doing a PhD's no small feat, what do you need to know when your start conducting research for a PhD?
-
Tools and tips for working securely
Curious to find out how you can contribute to a safe working environment? Then keep reading to discover our tips for working securely. They will help you to work more safely in specific situations. This section contains tools and tips to promote safe working habits in specific situations.
-
‘The gatekeepers’ van het internet; waarom een ‘gratis’ internet niet bestaat
Of je nu appt, online nieuws leest, of door Instagram scrolt, jouw gedrag wordt gemonitord. Sterker nog: wát jij ziet, wordt door anderen bepaald. Promovendus Aleksandre Zardiashvili onderzocht de impact van online advertenties en de macht van de bedrijven erachter.
- Zoom
-
Research using personal data
If your research project involves collecting private or otherwise sensitive data, you must ensure adequate data protection measures are taken. Research must be conducted in accordance with the General Data Protection Regulation (GDPR). In terms of patient data, for instance, when used for research carried…
-
Mythes rondom de geheime diensten ontkracht
In haar boek ‘Diensten met geheimen’ vertelt Willemijn Aerdts hoe de AIVD en MIVD te werk gaan. En ontkracht ze ook een paar mythes.
-
Prevent children becoming victims of a data-driven world
It is becoming increasingly common to collect data from children and young people through digital means. The impact of this so-called ‘dataveillance’ on children, who are monitored from birth via smartphones and Fitbits, is great.
-
eLaw Conference: eLaw Symposium (20 June) and AI & Data Protection Conference (21 June) – Call for Abstracts
Conference
-
eLaw Summer School: 'Regulating AI and data in an age of EU digital reforms', 24-28 June, Leiden (Registration now open!)
Course, Summer School
-
Shopping by appointment: What happens to your personal data?
In the Netherlands it is now possible to visit non-essential shops if you make an appointment beforehand. But when you book an appointment you have to provide a lot of personal data. Are shops allowed to ask you for all this data and what happens to it?
-
Bart Custers on successor to DigiD
The Netherlands has DigiD, Portugal ‘de Cartão de Cidadão’, and Ireland MyGovID. Europe now wants one uniform digital identity card - the same for all Member States. For the Dutch government, the European successor to DigiD is a prestige project. State Secretary Van Huffelen wants to roll out an app…
-
Bart Schermer about attack on citizens' right to demonstrate
Media outlets Investico, de Groene Amsterdammer and Trouw reported on the wide-scale collection by the Dutch police of personal data of demonstrators and their family members. Bart Schermer, Professor of Privacy and Cybercrime, commented on the issue.
-
Tinder match? Use facial recognition first
Recent developments in AI mean nobody is anonymous nowadays. The search engine PimEyes can find any photo of anyone that’s ever been placed online. No more Tinder Swindlers… or personal privacy. Everyone’s findable now. But is that even allowed?
-
Personal and sensitive data
Collecting personal and sensitive data is not as common an issue in archaeological research as in some other fields such as sociology and political sciences which is often the reason why archaeologists might not be aware that they are handling those types of data.
-
Open Science and archiving
Slowly but surely Open Science is becoming a standard in scholarly research, making it more open, collaborative, transparent, and after all FAIR, from its planning stages to publishing and re-use of data.
-
Project Management
Create an inventory of all the people/roles (potentially) involved in the research project, including their roles and responsibilities (concerning the research data), as well as how they relate to the university.
-
EU Privacy and Data Protection Law applied to AI: Unveiling the Legal Problems for Individuals
PhD defence
-
Bart Custers in Trouw about new European digital identity
Europe is working full steam towards a digital identity for every EU citizen. And although it might be really useful to be able to hire a car everywhere in the EU with no hassles, Bart Custers, Professor of Law and Data Science at eLaw, the Center for Law and Digital Technologies, sees many loose ends.…
-
eLaw at CPDP.ai 2024
eLaw looks back at a very successful presence at this year's 17th edition of the annual CPDP-conference in Brussels - this year rebranded as CPDP.ai to mark the attention for AI Regulation and Governance beyond privacy. eLaw has been a conference partner for years. Several staff members traveled with…
-
Sharing student data
Handling student data is a necessary part of your work as teacher or invigilator.
-
Data storage
Your options for data storage may vary depending on factors such as size and sensitivity of the data or collaboration with partners outside the university. We are all responsible for data protection. To keep (personal) data as secure as possible, the university has established an information security…