566 search results for “online privacy” in the Staff website
-
Online security: be vigilant with free services
ICT
-
listening in on your future job interview? On law, technology and privacy
The law and Artificial Intelligence (AI) applications need to be better aligned to ensure our personal data and privacy are protected. PhD candidate Andreas Häuselmann can see opportunities with AI, but dangers if this does not happen.
-
Daniel ValeFaculty of Law
d.s.vale@law.leidenuniv.nl | 071 5278838
-
Oliver TuazonFaculty of Law
o.m.tuazon@law.leidenuniv.nl | 071 5278838
-
Ahlam el Barnoussi-el MhamdiFaculty of Law
a.el.barnoussi@law.leidenuniv.nl | 071 5272727
-
Gera van DuijvenvoordeFaculty of Law
g.p.van.duijvenvoorde@law.leidenuniv.nl | +31 71 527 8838
-
Gianclaudio MalgieriFaculty of Law
g.malgieri@law.leidenuniv.nl | +31 71 527 8838
-
Why we are raising everyone’s awareness about cybersecurity: ‘Do things ever threaten to go horribly wrong here? Definitely.’
The university makes staff aware of the importance of cybersecurity at work. And that is essential, say our privacy and security officers. Because the number of cyberattacks is increasing, hackers are getting smarter all the time and by far the majority of problems are caused by human error. ‘Is that…
-
The danger of unregulated online communications
Social media gives people a voice but also fuels online hate, especially against marginalised groups. PhD candidate Eva Nave: ‘While end-to-end encryption protects activists, it also enables criminal activity, creating a more accessible version of the Darkweb.’
-
Eline VerhageFaculty of Law
e.n.verhage@law.leidenuniv.nl | +31 71 527 2727
-
Online hate speech undermines society
International Day of Education 2024 is dedicated to the role of education in countering hate speech. Assistant Professor Michael Klos says, 'When people are constantly derided online and that goes unpunished, they may start to withdraw from public discourse.'
-
Age checks need to respect children's rights
A variety of age checks are required, both in order to protect children and to ensure that they can participate online, a new study funded by the European Commission finds. The article on the study, co-authored by Simone van der Hof, Professor of Law and Digital Technologies at eLaw, was published in…
-
Simone van der Hof joins Comparison Committee Online Content Moderation Project (PrOCoM)
Simone van der Hof is a member of the Comparison Committee set up as part of the Online Content Moderation Project (PrOCoM).
-
Chief Information Security Officer: ‘Don’t delete phishing emails right away’
It’s Cybersecurity Awareness Month, and we’re spotlighting the importance of digital safety in the workplace. Our Chief Information Security Officer, Sylvia Bunte-Thelen, shares how staff can help keep our university a safe place to work and study. ‘We need to work together to protect our knowledge.…
-
How to make cryptographic techniques more efficient?
Sharing scientific data, transferring money, or sending other sensitive information online: with cryptography, applications make sure your data does not fall into the wrong hands. Mathematician Thomas Attema (CWI/TNO/Leiden University) helps with this. For his PhD research, he developed a new technique…
-
Gianclaudio Malgieri appointed to the Programme Committee of PLSC
Gianclaudio Malgieri, Associate Professor of Law and Board member at eLaw, has been appointed to the Programme Committee of PLSC, the Privacy Law Scholarship Conference, one of the world's most attended academic privacy conferences. Gianclaudio is the only representative from a Dutch university and…
-
Eduard Fosch VillarongaFaculty of Law
e.fosch.villaronga@law.leidenuniv.nl | +31 71 527 2834
-
'GDPR is no excuse for not tracing children placed in care'
The GDPR privacy legislation is no impediment to handing out sanctions to Russian oligarchs or reuniting children placed in care with their parents, says privacy experts Anna Berlee, Marlies van Eck, Simone van der Hof, Simone Huting, Friederike van der Jagt and Jeroen Terstegge.
-
'AIVD loopt risico's door het gebruik van Israëlische hacksoftware'
De AIVD gebruikt omstreden hacksoftware van de Israëlische leverancier NSO Group, meldde de Volkskrant. In 2019 zou de telefoon van topcriminineel Ridouan Taghi er mee gehackt zijn.
-
Outcome report for 2nd Expert Workshop on the EU Proposed Regulation on Online Child Sexual Abuse published
Workshop brings multidisciplinary experts together to debate proposed detection technologies and their impact on fundamental rights.
-
‘Supervision of the fight against cybercrime is poorly regulated'
Investigation services and cyber criminals both make grateful use of the opportunities offered by digital technologies. Both groups' use of these services leads to breaches of privacy for citizens. The current legislation falls short in providing protective measures, is the conclusion reached by Professor…
-
The police has been storing personal data for years – but is it allowed?
The Dutch police force has been deliberately storing personal data relating to millions of Dutch people for many years now. In doing so, the institution has been knowingly breaking the law. Bart Schermer, Professor of Law and Digital Technology expressed his concerns on Follow the Money – a platform…
-
Malgieri's co-authored paper on PETs presented and published at FAccT Conference 2024
Gianclaudio Malgieri's paper entitled 'The unfair side of Privacy Enhancing Technologies: addressing the trade-offs between PETs and fairness', coauthored with Alessandra Calvi from Vrije Universiteit Brussel and Dimitris Kotzinos from Paris Cergy University, is set to be presented at this week's prestigious…
-
Data processing register
A data processing register is a record of which personal data you process and who you share this data with. If you collect personal data for your research, you must record this in the data processing register.
-
Bart CustersFaculty of Law
b.h.m.custers@law.leidenuniv.nl | +31 71 527 8838
- KNIR Online Open Day
-
Keep track of the things you save: FGGA's data experts are here to help
Can you account for all the information and data in your possession? How do you deal with personal information? What do you do if there is a data breach? How do you save your data and are you aware of the regulations you need to adhere to while doing so? Where do you go if you are having ICT problems…
-
Always keep in mind
When applying for a grant, there are some important considerations. Keep these in mind during all steps of the application process!
-
Personal data
As a university employee, you probably work with personal data. That is not just names and telephone numbers – it can also include things like cookies. How can you make sure you are working in a privacy-proof way?
-
Workshops and training courses
Would you like to request a training course for your team or meeting? Leiden University offers basic training courses suitable for all employees as well as specific training courses focused on the unique risks within your department or team.
-
Storage and data recovery
As a standard, your workplace comes equipped with a limited amount of disk space. We offer a number of options for extending your disk space. In addition, ISSC can help you recover lost files. You can also securely store your files in the cloud via OneDrive and Teams. Whichever storage you use, be aware…
-
Information Management
The SOLO Information Management department offers assistance in all kinds of matters concerning privacy, information and IT.
-
Research Support @ FSW
We are a multidisciplinary network that advises and guides FSW researchers at every stage of their research journey.
-
Contact details
You can contact us daily from 9:00 to 17:00 hrs.
-
Swifties in PowNed video could take broadcaster to court
A controversial video in which PowNed asks Taylor Swift fans how far they would go for a meet-and-greet with the singer violates portrait rights according to Jeroen ten Voorde in Dutch newspaper ‘NRC’.
-
Report a potential incident immediately
Imagine you’ve accidentally sent a CV to the wrong email address or left your laptop on the train; a momentary lapse of concentration can result in a data breach or security incident. By responding quickly, we can limit the damage and consequences for privacy: both your own and the university’s. You…
-
Succesful online conference: Imperial Artefacts
On January 28 and 29, 2021 the conference ‘Imperial Artefacts: History, Law and the Looting of Cultural Property’ took place online. This first of its kind event at Leiden University was an interdisciplinary online conference and brought together (post-)colonial historians, legal historians, curators,…
-
Bart Custers on using genealogical DNA in criminal cases
The Public Prosecutor's Office (OM) and the Netherlands Forensic Institute (NFI) want to use private DNA databases for genealogical research in criminal investigations. The method could be used in serious criminal cases that have stalled and it is already being used in investigations abroad. Whether…
-
Help desks
We want to make it easy for you to do your work at Leiden University. Find out how to submit queries, get help, log issues or request other services.
-
Data processing agreement
If you bring in a (new) person who will be processing personal data for you, this person is not allowed to use this information for his or her own purposes. You need to formalise this in a data processing agreement. The university will usually have an agreement in place.
-
Working with AI
AI offers opportunities to make your work easier. However, there is also a downside to AI that may have consequences for your privacy and that of your colleagues. On this web page, you will find more information about the responsible use of AI within Leiden University.
-
ESOF2022 Online mini-symposium: The effect of the online world on adolescents
How do digital technologies affect adolescent mental health and resilience? How do we foster a secure online environment? How should we deal with increasing rates of online crimes among adolescents? During the mini-symposium ‘The effect of the online world on adolescents’, presented by the interdisciplinary…
-
Help and support
Leiden University provides staff with a modern ICT environment to carry out their work efficiently and securely. Here you will find more information regarding technical support, manuals, and contact persons, as well as answers to questions such as: Where can I report an ICT issue? How do I install software…
-
Online safety: automatic forwarding to external email addresses no longer permitted
ICT
-
Think carefully before sharing anything
Sharing data and documents with colleagues or other organisations can be useful, but it can also entail various risks. You should therefore think carefully before sharing anything, and always ask if you’re not sure whether sharing is permitted.
-
Sander Hölsgens in NRC about the online game The Elder Scrolls Online
Sander Hölsgens is Assistant Professor, anthropologist and the editor of Gamer.nl. In NRC he talks about his favourite moments in the online game The Elder Scrolls Online. Despite a mediocre start in 2014, the computer game based on the Elder Scrolls series now has an active community of millions of…
-
What to do in the event of a data breach
Any loss of control over stored personal data is a potential data breach. Most cases involve stolen or lost digital files, but a stolen or lost printed list of personal data is also a data breach. It is important to report any data breach.
-
Datamanagement
Data management refers to creating, saving, updating, making available, archiving and long-term storage of research data. The final goal of this process is often defined in terms of the FAIR principles: 'Findable, Accessible, Interoperable and Re-usable'.
-
Personal and professional development online: but how?
We can all look back on a turbulent year, a year in which we rapidly switched to working – and learning – online. Because pandemic or not, many staff members have continued to work on their development. Last year the Learning & Development team developed a wide range of online courses and training,…
-
New working method online study guide
Organisation