920 search results for “data” in the Staff website
-
Reporting incidents and accidents
What are you supposed to do if something goes or has gone wrong? Whether it be a break-in, an accident or an unsafe situation of any other kind, or a data breach or a cyber-attack; please read how to report each type of incident below.
-
Reporting incidents and accidents
What are you supposed to do if something goes or has gone wrong? Whether it be a break-in, an accident or an unsafe situation of any other kind, or data breach or cyber-attack; please read how to report each type of incident below.
-
Lock your screen
Locking your screen before leaving your desk: it’s so easy to do but we often forget. This quick action protects both you and the university. Do you always lock your screen when you leave to get a coffee, walk to the printer or chat with a colleague in the corridor?
-
Education Dashboard
Leiden University’s Education Dashboard contains key data for all the university’s degree programmes. Please note that at present the dashboard is only available in Dutch. For more information see the Dutch staff website or send an email to cijfers@bb.leidenuninv.nl.
-
What is TEC?
From the 2026-2027 academic year each programme will record the teaching preparation process in TimeEdit Curriculum (TEC). TEC is the curriculum source system in which data is recorded completely and reliably. From TEC, data can be exchanged with other systems. TEC replaces local Word and Excel files…
-
Check it: work privacy and security smart
We can all do our bit to keep our information and personal data safe. It’s easier than you think and is often about the small things. Working privacy and security smart means protecting your own data and that of your colleagues. Want to know how best to go about that? Check it out here!
-
Activating and managing your account
You can activate and manage your account via Account Services. To make the best use of Account Services, it is important that you set your account properly the first time you use it.
-
Privacy and security officers
You can contact the privacy or security officers with questions about privacy or data security.
-
Help desks
We want to make it easy for you to do your work at Leiden University. Find out how to submit queries, get help, log issues or request other services.
-
Report vulnerabilities in the systems
Leiden University devotes a great deal of attention to the security of its systems. Nevertheless there may still be vulnerabilities in our systems. If you discover such a vulnerability, please let us know as soon as possible.
-
ORCID iD and DOI
An ORCID iD is a unique code that identifies you as a scientist in a reliable and consistent way, much like the social security number in a passport. DOI does the same but for a scientific publication instead of a person. DOI and ORCID iD are examples of persistent identifiers.
- Events
-
Rachel de Jongr.g.de.jong@liacs.leidenuniv.nl | 071 5274799
-
Personal and company mobile devices
Here you will find guidelines for using devices such as laptops, tablets, and telephones. Whether you are working with a device purchased for you by ISSC or with a device you have purchased privately, it is important that you save your files securely and handle confidential data with care.
-
TEC: TimeEdit Curriculum
TimeEdit Curriculum (TEC) brings the teaching preparation process together in one complete and manageable source. Data is recorded clearly and automatically linked to other systems. This will in time reduce pressure of work and the process is less error-prone.
-
Centre for Digital Scholarship Summer Training Week
Seminars, workshops
-
Research Support Network
The Leiden Research Support Network is the essential network for research support professionals within Leiden University, where colleagues work together and share their knowledge to provide optimum support for researchers. The network's strength lies in the collaboration throughout faculties and ins…
-
Manuals
Do you want to install software yourself at your workplace? Or would you link to sync your work email with your smartphone? On this page you will find all our ICT workplace manuals, sorted by theme.
-
Functional MRI Analysis (Basics)
-
Edwin BakkerFaculteit Governance and Global Affairs
e.bakker@fgga.leidenuniv.nl | 070 8009506
-
Connect & Interlink: LEIbits
Webinar, Q&A, discussion
-
Phishing
We all occasionally receive an email from an unknown sender, with content we weren’t expecting or that raises our suspicions in some other way. This is usually a fake email, also known as a phishing email. In fact, there are various types of phishing: it can also be done over the phone.
- More information about cooperating with China
-
Frequently asked questions about privacy and security
Veelgestelde vragen privacy en security
-
PhD track
The PhD track involves many different aspects. As well as important administrative steps that you have to take, for example, there are also introductory activities, a training programme and opportunities for research abroad.
-
Connect & FAIRify: FAIRification of a high throughput metabolomics laboratory with FAIR Digital Objects
Webinar, Q&A, discussion
-
Telephones
For your work, you may need to make phone calls. Within the university, we use different types of telephony: phoning via Teams and mobile phones.
-
Curriculum
Leiden University uses TimeEdit Curriculum (TEC) for curriculum development and management.
-
Creating maps using Leaflet and QGIS
Training workshop
-
Activating your LU-card
To be able to activate your LU-Card online, it is necessary that you confirm your identity. We use the ReadID Ready app for this. On this page you will see what you need to confirm your identity.
- Results
-
Overleaf
LaTeX is a system for document preparation. It gives the user control over typesetting, references, complex formulas, and more. It is widely used in communication and publication of scientific documents in many fields.
-
Connect & Disclose the use of generative AI with the FAIR AI Attribution (FAIA) framework
Webinar with Q&A
-
Don't be fooled by phishing
You think you can spot a phishing scam: a suspicious email that asks for your password or other personal data. But these emails are becoming increasingly plausible, so you could still fall into the trap. That’s why this method is still used so often by people with malicious intent. Did you know that…
-
ULCN-account
As a new employee of Leiden University, you automatically receive a ULCN account that gives you direct access to your workplace, Wi-Fi, and various ICT systems. Here you will find all information about activating and securing this account, as well as answers to questions such as: How do I reset my password?…
-
Contact
Read where to go with your questions.
-
Logging in
Maileon offers two user environments: one for internal mailings and one for external mailings.
-
Towards Persistent Identification of Research Instruments
Workshop
-
Ethics committees
Ethics committees advise researchers on ethical issues relating to their research. For example, whether the research meets the criteria for ethically responsible conduct. There are a number of ethics committees within Leiden University.
-
Research Support Portal
The Research Support Portal first gives an explanation of how the portal works and then offers all kinds of information about research support within Leiden University. The portal serves as a guide for researchers during all phases of their externally funded research projects. Valuable information is…
-
Wifi and eduroam
You can surf the internet wirelessly on the eduroam wifi network. All data on the eduroam network is sent encrypted. Through eduroam, you have automatic wifi access at other universities and universities of applied sciences, in the Netherlands, Europe and further afield.
-
Frequently asked questions
You can suggest topics that need to be addressed in these FAQs. Please contact us at our usual email addresses and phone number(s).
-
Workshops and training courses
Would you like to request a training course for your team or meeting? Leiden University offers basic training courses suitable for all employees as well as specific training courses focused on the unique risks within your department or team.
-
Fraude en plagiaat
Fraude en plagiaat
-
Meta-analysis
- Activities
-
Corporate presentations
Giving a presentation about the University? There are standard presentations available.
-
Sharing and sending files
If you wish to share files with colleagues within or outside the university, you can save these files in the cloud. You can do this with Office 365 or OneDrive. If your files are too large to be send by e-mail, you can use SURFfilesender.
-
Training and supervision
From the start of your PhD you make agreements with your supervisors concerning your personal development and the supervision you receive. These agreements should be recorded in a Training and Supervision Plan. This plan contains agreements concerning your research, supervision, training, and potential…
-
ISSC helpdesk
The ISSC (ICT Shared Service Centre) helpdesk offers ICT support to all users of university workplaces.