622 search results for “data” in the Staff website
-
R introduction
-
Policy and vision
Leiden University strengthens the impact of its research through strategic collaborations and innovative themes. Here you will find more information about our vision on internationalisation and partnerships, as well as answers to questions such as: How do I benefit from the Leiden-Delft-Erasmus alliance?…
-
Academic integrity
The integrity and reliability of academic research are of fundamental importance to the University. All parties, both within and outside the University, must be able to have confidence that our research is conducted in a scrupulous, fair, verifiable, impartial and independent manner.
-
Mobile telephony
If you need a mobile telephone or a mobile subscription or data-only subscription, can apply for it via the helpdesk portal. You can also contact the helpdesk portal if you need to change or cancel a mobile or data-only subscription.
-
Camera surveillance
Whether you’re a student, staff member or external service provider, it’s important that you feel safe at Leiden University. A range of measures are in place to assure safety and security in all the university’s buildings and grounds.
-
Working with AI
AI offers opportunities to make your work easier. However, there is also a downside to AI that may have consequences for your privacy and that of your colleagues. On this web page, you will find more information about the responsible use of AI within Leiden University.
-
Team Marketing
Team Marketing at Leiden University is the central point of contact for everything related to recruiting bachelor’s and master’s students, both nationally and internationally. Activities are carried out in a data-driven, strategic, and creative way to strengthen the University’s brand and guide prospective…
-
Save the date: Centre for Digital Scholarship Summer Training Week 2026
Workshops, lectures
-
Frequently Asked Questions
Answers to the most common questions about Maileon
-
Research
Leiden University offers researchers extensive facilities and support at every stage of their academic career. Here you will find more information on funding, policy, and publishing, as well as answers to questions such as: How do I arrange a PhD track? Which research grants are available? And what…
-
ICT
Leiden University supports you with a modern and secure digital working environment. Here you will find all information about the available facilities and systems, as well as answers to questions such as: How do I install software? How do I secure my account? And which tools are available for my research…
-
Sensitivity labels
To protect sensitive data, such as personal details or confidential business information, the university uses so-called sensitivity labels in Microsoft 365. On this page, you can learn what sensitivity labels are and how to use them.
-
Teaching academic integrity
Within all bachelor’s and master’s programmes, depending on the type of programme, attention is paid to ensuring that academic research is carried out scrupulously. For each programme, this is done in a way that is appropriate for the discipline in question.
-
Application forms
Did you forget your password and do you want to request a new one? Do you want to modify storage for a workgroup, including access rights? Or do you want to submit another request for our ICT services or products? Please use the forms below.
-
Reporting incidents and accidents
What are you supposed to do if something goes or has gone wrong? Whether it be a break-in, an accident or an unsafe situation of any other kind, or data breach or cyber-attack; please read how to report each type of incident below.
-
Reporting incidents and accidents
What are you supposed to do if something goes or has gone wrong? Whether it be a break-in, an accident or an unsafe situation of any other kind, or a data breach or a cyber-attack; please read how to report each type of incident below.
-
Check it: work privacy and security smart
We can all do our bit to keep our information and personal data safe. It’s easier than you think and is often about the small things. Working privacy and security smart means protecting your own data and that of your colleagues. Want to know how best to go about that? Check it out here!
-
Lock your screen
Locking your screen before leaving your desk: it’s so easy to do but we often forget. This quick action protects both you and the university. Do you always lock your screen when you leave to get a coffee, walk to the printer or chat with a colleague in the corridor?
-
Education Dashboard
Leiden University’s Education Dashboard contains key data for all the university’s degree programmes. Please note that at present the dashboard is only available in Dutch. For more information see the Dutch staff website or send an email to cijfers@bb.leidenuninv.nl.
-
What is TEC?
From the 2026-2027 academic year each programme will record the teaching preparation process in TimeEdit Curriculum (TEC). TEC is the curriculum source system in which data is recorded completely and reliably. From TEC, data can be exchanged with other systems. TEC replaces local Word and Excel files…
-
AI in education
Generative AI such as Chat GPT has been part of our working and learning environment since 2022. This AI use in the educational setting by students, teachers and staff members comes with a number of new challenges. The creative process of writing a "classic paper" for instance, can be carried out partly…
-
Samar KhalilFaculty of Science
s.s.khalil@liacs.leidenuniv.nl | 071 5272727
-
Activating and managing your account
You can activate and manage your account via Account Services. To make the best use of Account Services, it is important that you set your account properly the first time you use it.
-
Privacy and security officers
You can contact the privacy or security officers with questions about privacy or data security.
-
Help desks
We want to make it easy for you to do your work at Leiden University. Find out how to submit queries, get help, log issues or request other services.
-
Report vulnerabilities in the systems
Leiden University devotes a great deal of attention to the security of its systems. Nevertheless there may still be vulnerabilities in our systems. If you discover such a vulnerability, please let us know as soon as possible.
-
ORCID iD and DOI
An ORCID iD is a unique code that identifies you as a scientist in a reliable and consistent way, much like the social security number in a passport. DOI does the same but for a scientific publication instead of a person. DOI and ORCID iD are examples of persistent identifiers.
-
Rachel de JongFaculty of Science
r.g.de.jong@liacs.leidenuniv.nl | 071 5274799
-
Personal and company mobile devices
Here you will find guidelines for using devices such as laptops, tablets, and telephones. Whether you are working with a device purchased for you by ISSC or with a device you have purchased privately, it is important that you save your files securely and handle confidential data with care.
-
TEC: TimeEdit Curriculum
TimeEdit Curriculum (TEC) brings the teaching preparation process together in one complete and manageable source. Data is recorded clearly and automatically linked to other systems. This will in time reduce pressure of work and the process is less error-prone.
-
Edwin BakkerFaculty of Governance and Global Affairs
e.bakker@fgga.leidenuniv.nl | 070 8009506
-
Suzan VerberneFaculty of Science
s.verberne@liacs.leidenuniv.nl | 31 71 527 7043
-
Centre for Digital Scholarship Summer Training Week
Seminars, workshops
-
Manuals
Do you want to install software yourself at your workplace? Or would you link to sync your work email with your smartphone? On this page you will find all our ICT workplace manuals, sorted by theme.
-
Functional MRI Analysis (Basics)
-
Logging in
Maileon offers two user environments: one for internal mailings and one for external mailings.
-
Research Support Network
The Leiden Research Support Network is the essential network for research support professionals within Leiden University, where colleagues work together and share their knowledge to provide optimum support for researchers. The network's strength lies in the collaboration throughout faculties and ins…
-
Connect & Interlink: LEIbits
Webinar, Q&A, discussion
-
Phishing
We all occasionally receive an email from an unknown sender, with content we weren’t expecting or that raises our suspicions in some other way. This is usually a fake email, also known as a phishing email. In fact, there are various types of phishing: it can also be done over the phone.
- More information about cooperating with China
-
Frequently asked questions about privacy and security
Veelgestelde vragen privacy en security
-
PhD track
The PhD track involves many different aspects. As well as important administrative steps that you have to take, for example, there are also introductory activities, a training programme and opportunities for research abroad.
-
Telephones
For your work, you may need to make phone calls. Within the university, we use different types of telephony: phoning via Teams and mobile phones.
-
Curriculum
Leiden University uses TimeEdit Curriculum (TEC) for curriculum development and management.
-
Connect & FAIRify: FAIRification of a high throughput metabolomics laboratory with FAIR Digital Objects
Webinar, Q&A, discussion
-
Creating maps using Leaflet and QGIS
Training workshop
-
Activating your LU-card
To be able to activate your LU-Card online, it is necessary that you confirm your identity. We use the ReadID Ready app for this. On this page you will see what you need to confirm your identity.
-
Contact
Read where to go with your questions.
-
ULCN-account
As a new employee of Leiden University, you automatically receive a ULCN account that gives you direct access to your workplace, Wi-Fi, and various ICT systems. Here you will find all information about activating and securing this account, as well as answers to questions such as: How do I reset my password?…
-
Don't be fooled by phishing
You think you can spot a phishing scam: a suspicious email that asks for your password or other personal data. But these emails are becoming increasingly plausible, so you could still fall into the trap. That’s why this method is still used so often by people with malicious intent. Did you know that…