1,029 search results for “from data to inzicht” in the Staff website
-
Data management, privacy and data protection
As a PhD candidate, you work with data. To keep (personal) data as secure as possible, the university has established an information security policy.
-
LIFES: From Reusable Data to New Treatments and Faster Diagnoses
Early diagnosis, new treatments, and personalised care: all of these are possible if we can better unlock the wealth of information hidden in health data. Unfortunately, this data is often poorly organised, difficult to access, and not interoperable. The new international Leiden Institute for FAIR and…
-
Make your data FAIR
Contemporary data management practices rest on the four principles: findability, accessibility, interoperability, and reusability.
-
From Data Creator to Data Reuser: Distance Matters
Lecture
-
‘Using real-world data to enhance our healthcare system’
On 16 May 2022, Professor Michel Wouters from the Department of Biomedical Data Sciences at the Leiden University Medical Centre (LUMC), will deliver his inaugural lecture titled ‘Quality of Cancer Care: why the real world matters’. Wouters will use the opportunity to describe how quality registries…
-
Personal data
As a university employee, you probably work with personal data. That is not just names and telephone numbers – it can also include things like cookies. How can you make sure you are working in a privacy-proof way?
-
Research Data Management in Archaeology
Doing research in archaeology is more than just gathering data and publishing a paper. Nowadays, there is a growing trend in producing well-defined and responsible data management plans. They help to navigate the process and result in good data management practices which in return benefit the researchers…
-
Personal data: privacy and the GDPR
As an employee of Leiden University, you probably work with or come into contact with personal data. The concept of ‘personal data’ is core to the General Data Protection Regulation (GDPR). If you work with personal data, you must be able to explain clearly, comprehensively and in simple language how…
- MSc Data Statistics & Data Science Graduation Ceremony
-
Data storage
Your options for data storage may vary depending on factors such as size and sensitivity of the data or collaboration with partners outside the university. We are all responsible for data protection. To keep personal data as secure as possible, approved tools should be used to ensure safe processing…
-
Structuring data
When structured properly, the data are easier to manipulate, analyze and visualize.
-
Data stewards
Do you have questions about data management? Please contact the data stewards:
-
Mariëlle Linting
Faculty of Social and Behavioural Sciences
-
Privacy and data breaches
Any loss of control over stored personal data constitutes a potential data leak. In most cases this concerns stolen (or lost) digital files, but a stolen (or mislaid) printed list containing personal data also represents a data leak. It is important that you report any data leak.
-
Data processing register
A data processing register is a record of which personal data you process and who you share this data with. If you collect personal data for your research, you must record this in the data processing register.
-
Data processing agreement
If you bring in a (new) person who will be processing personal data for you, this person is not allowed to use this information for his or her own purposes. You need to formalise this in a data processing agreement. The university will usually have an agreement in place.
-
Personal and sensitive data
Collecting personal and sensitive data is not as common an issue in archaeological research as in some other fields such as sociology and political sciences which is often the reason why archaeologists might not be aware that they are handling those types of data.
-
Research using personal data
If your research project involves collecting private or otherwise sensitive data, you must ensure adequate data protection measures are taken. Research must be conducted in accordance with the General Data Protection Regulation (GDPR). In terms of patient data, for instance, when used for research carried…
-
Deleting personal data
Individuals have the right to instruct the university to delete their personal data in a number of cases. For instance, if the university no longer needs the data, or if the person withdraws consent previously given.
-
Data Science Research Programme
Universities, companies, organisations and societies are increasingly facing enormous quantities of data. It is a great challenge to transform these Big Data into knowledge, which is why Leiden University has launched a University-wide Data Science Research Programme.
-
Storage and data recovery
As a standard, your workplace comes equipped with a limited amount of disk space. We offer a number of options for extending your disk space. In addition, ISSC can help you recover lost files. You can also securely store your files in the cloud via OneDrive and Teams. Whichever storage you use, be aware…
-
Data Management Plan
Firstly, Data Management Plan (DMP) is after all a plan, so you must carry it out!
- Research Data Management
-
Intelligent Data Analysis Symposium
Conference
-
One-off data processing
Are you handling personal data just once, for instance when taking the minutes of a meeting or organising an employee outing? You do not need to include this use in the data processing register if you stick to the following conditions.
-
Van data naar actie
Inaugural lecture
-
Pieter KroonenbergFaculty of Social and Behavioural Sciences
-
Wessel KraaijFaculty of Science
-
Peter GrünwaldFaculty of Science
-
Data Management Plan course for PhD's
Didactics, Career development
-
Data Management Training Leiden Law School
Research
-
How to find and reuse data
-
New Research Data Management Protocol Approved
Research
-
Mathijs DeenFaculty of Social and Behavioural Sciences
-
Jelle GoemanFaculty of Medicine
-
Marta FioccoFaculty of Science
-
Data storage
Your options for data storage may vary depending on factors such as size and sensitivity of the data or collaboration with partners outside the university. We are all responsible for data protection. To keep (personal) data as secure as possible, the university has established an information security…
-
Wouter van LoonFaculty of Social and Behavioural Sciences
-
What to do in the event of a data breach
Any loss of control over stored personal data is a potential data breach. Most cases involve stolen or lost digital files, but a stolen or lost printed list of personal data is also a data breach. It is important to report any data breach.
-
New Data Management Protocol for researchers at Leiden Law School
Research
-
Workshop: How to write a Data Management Plan (DMP)
Workshop
-
Workshop: How to write a Data Management Plan (DMP)
Workshop
-
Oliver TuazonFaculteit der Rechtsgeleerdheid
-
Laura ZwepFaculty of Science
-
Data Carpentry with R for Social Sciences and Humanities
Workshop
-
Matthijs van LeeuwenFaculty of Science
-
Gerrit-Jan ZwenneFaculteit der Rechtsgeleerdheid
-
Danny MekicFaculteit der Rechtsgeleerdheid
-
Harold NefsFaculty of Social and Behavioural Sciences
-
Sarah PlukaardFaculty of Social and Behavioural Sciences