217 search results for “personal data” in the Staff website
-
Koos Biesmeijer and Claire van Megen nominated for Person of the Year
Koos Biesmeijer, Professor of Natural Capital, and Claire van Megen, an Educational and Child Studies student, are in with a chance of winning Leiden’s Person of the Year title.
-
Franco Donati
Science
f.donati@cml.leidenuniv.nl | +31 71 527 4571
-
Security
All university locations and buildings are monitored and fitted with cameras. Read on to find out where to get advice about security for a building, person or event that may be at higher risk.
-
Microsoft Authenticator
After entering your username and password in Teams, Office 365 and OneDrive, you need to confirm your login through the Microsoft Authenticator app. This is an extra security step (multifactor authentication).
-
Data Management Training Leiden Law School
Research
-
Privacy and security officers
You can contact the privacy or security officers with questions about privacy or data security.
-
Scientometrics Using Open Data
Research
-
LaTeX
LaTeX is a system for document preparation. It gives the user control over typesetting, references, complex formulas, and more. It is widely used in communication and publication of scientific documents in many fields.
-
Activating your LU-card
To be able to activate your LU-Card online, it is necessary that you confirm your identity. We use the ReadID Ready app for this. On this page you will see what you need to confirm your identity.
-
Multilevel and Longitudinal Data Analysis
-
Report incidents and accidents
What are you supposed to do if something goes or has gone wrong? Whether it be a break-in, an accident or an unsafe situation of any other kind, or data breach or cyber-attack; please read how to report each type of incident below.
-
Data Management Plan course for PhD's
Didactics, Career development
-
Multilevel and Longitudinal Data Analysis (Advanced)
-
Simone van der Hof
Faculteit Rechtsgeleerdheid
s.van.der.hof@law.leidenuniv.nl | +31 71 527 8838
-
Supercomputer Alice
Supercomputer ALICE has been expanded, making it even more powerful and faster. This means researchers and students can work with heavier models. From language research to brain activity scans, this expansion is good news for a variety of disciplines. So who gets to work with this prima donna?
-
Workshop: How to write a Data Management Plan (DMP)
Workshop
-
Workshop: How to write a Data Management Plan (DMP)
Workshop
-
Workshop: How to write a Data Management Plan (DMP)
Workshop
-
Workshop: How to write a Data Management Plan (DMP)
Workshop
-
Workshop: How to write a Data Management Plan (DMP)
Workshop
-
Workshop: How to write a Data Management Plan (DMP)
Workshop
-
How to write a Data Management Plan (DMP)
Research
-
Professionalizing your community: an example from data management
Webinar
-
Data Carpentry with R for Social Sciences and Humanities
Workshop
-
Data Carpentry with R for Social Sciences and Humanities
Workshop
-
Privacy: don’t wait too long to seek help
ICT
-
A quick call with Eric van Hoof on online privacy, knights’ shields and looking left, right and left again
With Sunday 28 January the annual European Data Protection Day, we are drawing attention to data protection and the right to privacy. Because it’s okay to stop and think before sharing our data or that of others, says privacy officer Eric van Hoof. ‘If you cross the road, you don’t do so without looking…
-
EUniWell Open Lecture Series | “Soli-Data-Rity” - The use of data for personalised medicine
Lecture, Lecture part of a series
-
Open Science in the Humanities: From Public Discourse to Qualitative Data
Lecture
-
EUniWell Open Lecture Series | From knowledge transfer to personal development
Lecture, Part of Open Lectures Serie
-
Cybersecurity Awareness Month: seven tips to prevent phishing
ICT, Security
-
Online security: be vigilant with free services
ICT
-
Be aware of the risks of using chatbots like ChatGPT in your work
Security
-
Registration and contract
As you are a new Leiden University staff member, a number of things must happen before we can draw up your contract and activate your ULCN account. This is also the case if you are affiliated with the university as external staff, for example if you were hired as a freelancer.
-
series | European standards of Human Rights protection of displaced persons fleeing armed conflicts
Lecture, Part of a series
-
Participation in the Cultural Diversity Barometer: more insight into diversity among staff
Diversity and inclusion are core values for Leiden University, and our aim is to offer all staff and students equal opportunities. As the University lacks adequate information about the cultural diversity of our staff, this spring we are taking part for the first time in the Cultural Diversity Barometer.…
- Cybersecurity month: Follow good information security practices
-
Frequently asked questions
You can suggest topics that need to be addressed in these FAQs. Please contact us at our usual email addresses and phone number(s).
-
Cybersecurity: how can you reduce the risk of reputational damage to the University?
ICT
-
How cyber safe are you? Take the survey and you could win an iPad
Security
-
Cybersecurity Awareness Month: Always report incidents – even if you’re unsure!
ICT, Security
-
Application forms
Did you forget your password and do you want to request a new one? Do you want to modify storage for a workgroup, including access rights? Or do you want to submit another request for our ICT services or products? Please use the forms below.
- Cybersecurity: use BCC rather than CC in your emails
-
Escape room challenges staff to work safely online
An escape room gave staff the chance to test their knowledge about cybersecurity at work. Would they manage to defuse the bomb in time without falling for the phishing emails or causing a data breach?
-
What does research support involve?
The first hybrid Leiden Research Support Conference – organised for and by research support staff – took place on 27, 28 and 29 September and focused entirely on organising effective research support.
-
Working securely online
All employees of Leiden University handle data or personal information. And it is very likely that, at some point or another, everyone will receive a suspicious email or have to deal with other attempts by hackers to gain access to this data. Some cybercriminals try to obtain data because they want…
-
Keeping our campus safe
The world is in turmoil. International wars and conflicts have been raging for some time. And political and social developments are causing insecurity, uncertainty and unrest. This has not gone unnoticed within our university community. We have seen protests, demonstrations and other incidents. This…
-
Online lecture: consent in research
Lecture
-
Help and support
Are you looking for a contact person, because you for instance have a question about privacy, or you need a ULCN guest or uSis account? Or do you need a manual or application form? Below you will find more information.
-
Phishing
We all occasionally receive an email from an unknown sender, with content we weren’t expecting or that raises our suspicions in some other way. This is usually a fake email, also known as a phishing email. In fact, there are various types of phishing: it can also be done over the phone.