621 search results for “privacy en gegevens beschermingsrecht” in the Staff website
-
Over barrières en bruggen - Auto-immuunziektes op weg naar genezing
Inaugural lecture
-
Feel Good, Bad and Ugly; 7^2 jaren UL: reflectie en optimalisatie
Valedictory lecture
-
Hoe de hazen lopen - Lessen uit de strafrechtspraktijk voor wetgeving en beleid
Inaugural lecture
-
Veerkrachtig Verleden. Een reflectie op archeologie, archeologen en musea in het Anthropoceen
Inaugural lecture
-
IPR als onderdeel van de internationale architectuur: over een januskop en contact met de buren
Inaugural lecture
-
Wat is hier de bedoeling? Tussen eenvoud en meervoud in publiek leiderschap
Inaugural lecture
-
Er is zo Veel Meer tussen 1 en 0; Opmaat voor een Antropologie van Digitale Diversiteit
Inaugural lecture
-
van Antoine de Saint-Exupéry - Bouwen aan de samenwerking tussen recht en gezondheid
Inaugural lecture
-
Using images at Leiden University
Images are an increasingly important part of communication, but how do you choose suitable ones for the website and where can you find them? This page offers tips on finding the right image and what to watch out for.
-
Editing room 1A45
Want to edit video, photo and audio material with Adobe Creative Cloud apps? You can do so on the computers in editing room 1A45.
-
Research funding
Leiden University offers a broad range of support for finding, writing, and applying for research funding. The first point of contact is your local grant adviser at your faculty/institute, who can guide you through the application process and answer any questions you may have. If your faculty/institute…
- New: Talent and Development Platform combines GROW, recruitment & selection and learning and development
- Practical AI in Academia Leiden
-
Social media
Making use of social media is a good way to meet others or to hear about the latest news and developments. But it also has its downsides: disinformation, trolling, disrespectful comments and even the misuse of (personal) data.
- Back on demand: Workshop 'Reduce your workload with GenAI'
- Webinar: Save time with smarter use of digital tools
-
naar online prijsdiscriminatie? Kimia Heidary, Bart Custers, Helen Pluut en Jean-Pierre van der Rest schreven hier een artikel over.
Hoe kijken Nederlandse bedrijven naar online prijsdiscriminatie? Kimia Heidary, Bart Custers, Helen Pluut en Jean-Pierre van der Rest schreven hier een artikel over.
-
Anne Meuwese and Bart Custers in Trouw on Covid apps
The more people are vaccinated, the more society can slowly reopen. Technological developments, like the Covid passport and other apps, can play a role in this. Artificial Intelligence could help greatly in developing the vaccine passport and the Covid-19 exposure notification app, Anne Meuwese and…
-
Bram Klievink in Trouw over dataprivacy
Last weekend, an article on data privacy appeared in Trouw. In this essay, Bram Klievink, Professor of Digitization and Public Policy at the FGGA, addresses the issue of data privacy. What are the downsides of the rules the tech giants have to abide by?
-
New professor Elise Dusseldorp: ‘The longer you’re in research, the more humble you become’
Elise Dusseldorp has been appointed Professor in the Methodology and Statistics of Psychological Research. In the same way that she spends her spare time rambling through the forest, as a professor she sifts through colleagues’ research data. ‘I often come across information that doesn’t appear in the…
-
Monique van den DriesFaculty of Archaeology
m.h.van.den.dries@arch.leidenuniv.nl | +31 71 527 2383
-
Dennis BosFaculty of Humanities
d.bos@hum.leidenuniv.nl | +31 71 527 2722
-
Tessa van BuchemFaculty of Law
t.j.m.van.buchem@law.leidenuniv.nl | 071 5275390
-
Margot Kaminski presenting at eLaw on 6 March
On Wednesday 6 March, eLaw - Center for Law and Digital Technologies will be hosting Professor Margot Kaminski, an eminent scholar from Colorado Law School, for a research morning on her new paper on Participatory Data Governance, co-authored with Dr Gianclaudio Malgieri, Associate Professor at eL…
-
algemene belangenafwegingen in het Europese staatssteunrecht: tussen verbod en verenigbaarheid
PhD defence
-
Radicale democratie. Pieter Vreede (1750-1837) en de Nederlandse Revolutie
PhD defence
-
Van liefdadigheid naar abortusstrijd. Leidse vrouwen en de Nederlandse vrouwenbeweging van 1860 tot 1990.
PhD defence
-
Dirección Pública: Mérito, profesionalización y modernización del Estado en Chile
PhD defence
-
Capital humano femenino en la minería chilena: asociaciones público- privadas, responsabilidad social empresarial y género
PhD defence
-
Sultan Hamid II van Pontianak en de federale staatsvorming van Indonesië
PhD defence
-
zonnestelsel: de prachtige planetaire paralellen van tastbare gesteenten en inspirerende landschappen
Lecture
-
De kracht van taal: hoe kennis van het Russisch ons helpt Rusland en taal beter te begrijpen
Inaugural lecture
-
Data breach public groups in SharePoint/Teams
Security
-
eLaw Alumnus wins European Data Protection Law Review ‘Young Scholar Award’ at CPDP
Taner Kuru, an eLaw alumnus, was awarded the prestigious European Data Protection Law Review ‘Young Scholar Award’ for his paper on the shortcomings in the GDPR for the regulation of genetic testing at the prestigious Computers, Privacy and Data Protection Conference (CPDP).
-
NWO Grant for Research into the History of Languages: ‘It tells us something about our past as humans’
A collaboration between linguists, geographers and anthropologists aims to uncover how languages spread across South America over thousands of years. Associate Professor Rik van Gijn is responsible for the linguistic side of this NWO project.
-
New Master’s programme in Transfusion Medicine and Cellular and Tissue Therapies
LUMC and Leiden University will start the new two-year online master's program in Transfusion Medicine and Cellular and Tissue Therapies from October 2023.
-
Employee Experience Survey: Your opinion matters more than ever
Organisation
-
Iris JongejanFaculty of Governance and Global Affairs
i.k.jongejan@fgga.leidenuniv.nl | +31 70 800 9500
-
Marco VisserFaculty of Science
m.d.visser@cml.leidenuniv.nl | 071 5277481
-
Gido Oude KotteFaculty of Governance and Global Affairs
g.e.oude.kotte@fgga.leidenuniv.nl | 071 5272727
-
Rosanneke EmmenSocial & Behavioural Sciences
r.a.g.emmen@fsw.leidenuniv.nl | +31 71 527 2727
-
Article on Affective Computing by Andreas Häuselmann published in IDPL
Affective Computing (AC and sometimes called ‘Emotional AI’) provides opportunities to automatically process emotional data. However, is EU data protection law fit for purpose when it is applied to such AC approaches?
-
Data breach at Leiden University
Organisation, Security
-
Activism, Indigenous Survival, and Settler Colonialism in the Unist’ot’en Camp’s Resistance against the Coastal GasLink Pipeline
Lecture
-
Appropriation foncière, migrations agricoles et conflits armés en Pays Dogon (Mali)
PhD defence
-
'Protecting your data is not something you do just for yourself'
How safely do you handle your data? Privacy officer Eric van Hoof assists researchers and staff with this. 'The biggest mistake people make is thinking they have nothing to hide.' He has some useful tips.
-
Research Data Management in Archaeology
Doing research in archaeology is more than just gathering data and publishing a paper. Nowadays, there is a growing trend in producing well-defined and responsible data management plans. They help to navigate the process and result in good data management practices which in return benefit the researchers…
-
Cybersecurity Awareness Month: what information are you sharing online?
ICT, Security
-
Outcome report for 2nd Expert Workshop on the EU Proposed Regulation on Online Child Sexual Abuse published
Workshop brings multidisciplinary experts together to debate proposed detection technologies and their impact on fundamental rights.
-
Classroom scanners in the Lipsius building tested by ethical hackers
To check whether the classroom scanners are secure, a ‘pen test’ was performed in the Lipsius building on Monday 28 March. This involved switching on the person counters for a day so that ethical hackers could try to gain access to the system.