710 search results for “data protection” in the Staff website
- General Data Protection Regulation
-
Workshop 'Privacy for researchers:data protection in a changing world'
ICT, Research
-
eLaw Alumnus wins European Data Protection Law Review ‘Young Scholar Award’ at CPDP
Taner Kuru, an eLaw alumnus, was awarded the prestigious European Data Protection Law Review ‘Young Scholar Award’ for his paper on the shortcomings in the GDPR for the regulation of genetic testing at the prestigious Computers, Privacy and Data Protection Conference (CPDP).
-
Research using personal data
If your research project involves collecting private or otherwise sensitive data, you must ensure adequate data protection measures are taken. Research must be conducted in accordance with the General Data Protection Regulation (GDPR). In terms of patient data, for instance, when used for research carried…
-
Mason Marks
Faculteit Rechtsgeleerdheid
m.m.marks@umail.leidenuniv.nl | +31 71 527 5200
-
Personal data
As a university employee, you probably work with personal data. That is not just names and telephone numbers – it can also include things like cookies. How can you make sure you are working in a privacy-proof way?
-
Data processing register
A data processing register is a record of which personal data you process and who you share this data with. If you collect personal data for your research, you must record this in the data processing register.
-
Data storage
Your options for data storage may vary depending on factors such as size and sensitivity of the data or collaboration with partners outside the university. We are all responsible for data protection. To keep (personal) data as secure as possible, the university has established an information security…
-
Andreas Häuselmann
Faculteit Rechtsgeleerdheid
a.n.hauselmann@law.leidenuniv.nl | +31 71 527 5200
-
Alan Sears
Faculteit Rechtsgeleerdheid
a.m.sears@law.leidenuniv.nl | +31 71 527 8838
-
Gerrit-Jan Zwenne
Faculteit Rechtsgeleerdheid
g.j.zwenne@law.leidenuniv.nl | +31 71 527 8838
-
Privacy and data breaches
Any loss of control over stored personal data constitutes a potential data leak. In most cases this concerns stolen (or lost) digital files, but a stolen (or mislaid) printed list containing personal data also represents a data leak. It is important that you report any data leak.
-
Personal data: privacy and the GDPR
As an employee of Leiden University, you probably work with or come into contact with personal data. The concept of ‘personal data’ is core to the General Data Protection Regulation (GDPR). If you work with personal data, you must be able to explain clearly, comprehensively and in simple language how…
-
Gianclaudio Malgieri
Faculteit Rechtsgeleerdheid
g.malgieri@law.leidenuniv.nl | +31 71 527 8838
-
Els de Busser
Faculty Governance and Global Affairs
e.de.busser@fgga.leidenuniv.nl | +31 70 800 9094
-
Oliver Tuazon
Faculteit Rechtsgeleerdheid
o.m.tuazon@law.leidenuniv.nl | +31 71 527 8838
-
Personal and sensitive data
Collecting personal and sensitive data is not as common an issue in archaeological research as in some other fields such as sociology and political sciences which is often the reason why archaeologists might not be aware that they are handling those types of data.
-
Daniel Vale
Faculteit Rechtsgeleerdheid
d.s.vale@law.leidenuniv.nl | +31 71 527 8838
-
Helena Vrabec
Faculteit Rechtsgeleerdheid
h.u.vrabec@law.leidenuniv.nl | +31 71 527 8838
-
Shopping by appointment: What happens to your personal data?
In the Netherlands it is now possible to visit non-essential shops if you make an appointment beforehand. But when you book an appointment you have to provide a lot of personal data. Are shops allowed to ask you for all this data and what happens to it?
-
Sharing student data
Handling student data is a necessary part of your work as teacher or invigilator.
-
‘Standing Room Only’ at eLaw’s CPDP Panel on 'Dark Patterns and Data-Driven Manipulation'
With the conference circuit slowly reopening after Covid forced almost all academic interactions online, thousands of conference attendees descended on Brussels for Europe’s largest technology conference. eLaw’s annual sponsorship of one of the many CPDP conference panels brought a diverse range of…
-
Book presentation ‘Cybersecurity, Privacy and Data Protection in EU Law’
Lecture
-
Article on Affective Computing by Andreas Häuselmann published in IDPL
Affective Computing (AC and sometimes called ‘Emotional AI’) provides opportunities to automatically process emotional data. However, is EU data protection law fit for purpose when it is applied to such AC approaches?
-
Gianclaudio Malgieri co-organised Brussels Privacy Symposium and launched 'VULNERA'
On 15 November in Brussels, the Brussels Privacy Hub and the Future of Privacy Forum held the 6th edition of the 'Brussels Privacy Symposium'. The topic of this year was 'Vulnerable People, Marginalisation and Data Protection'.
-
Els Kindt
Faculteit Rechtsgeleerdheid
e.j.kindt@law.leidenuniv.nl | +31 71 527 8838
-
Bart Custers on BBC News about Uber’s Greyballing
In just over a decade, Uber has revolutionised how we move around our cities. The ride-hailing app was a game-changer: you just tapped your phone and a cab would find you. You even paid through the app. However, some of the Uber’s more controversial practices have triggered the interest of law enforcement,…
-
Research Data Management in Archaeology
Doing research in archaeology is more than just gathering data and publishing a paper. Nowadays, there is a growing trend in producing well-defined and responsible data management plans. They help to navigate the process and result in good data management practices which in return benefit the researchers…
-
'Protecting your data is not something you do just for yourself'
How safely do you handle your data? Privacy officer Eric van Hoof assists researchers and staff with this. 'The biggest mistake people make is thinking they have nothing to hide.' He has some useful tips.
-
Data management
Data management can be defined as the creation, storage, maintenance, disclosure, archiving and sustainable preservation of research data.
-
Guest lecture European Data Protection Supervisor, Wojciech Wiewiórowski
Lecture
-
Guest lecture Wojciech Wiewiórowski, European Data Protection Supervisor
Lecture
-
Data storage
Research data must be securely preserved, during but also after your research. Read about data management, data retention and open science.
-
Structuring data
When structured properly, the data are easier to manipulate, analyze and visualize.
-
Data stewards
Do you have questions about data management? Please contact the data stewards:
-
Gianclaudio Malgieri, intervened in the Global Privacy Assembly 2022
On October 26, Gianclaudio Malgieri (Associate professor at eLaw) moderated a plenary panel about "Blockchain and Metaverse: Privacy and Data Protection" at the 44th Global Privacy Assembly in Istanbul, the biggest world institutional conference about privacy and data protection.
-
Data processing agreement
If you bring in a (new) person who will be processing personal data for you, this person is not allowed to use this information for his or her own purposes. You need to formalise this in a data processing agreement. The university will usually have an agreement in place.
-
Implementation data management programme
Within LRS, the implementation of the data management programme focuses on new facilities, support and tools for managing and sharing research data. The aim is to facilitate data management for institutes and researchers, while also enabling them to fulfil the requirements in the areas of integrity,…
-
Data Science Research Programme
Universities, companies, organisations and societies are increasingly facing enormous quantities of data. It is a great challenge to transform these Big Data into knowledge, which is why Leiden University has launched a University-wide Data Science Research Programme.
-
Deleting personal data
Individuals have the right to instruct the university to delete their personal data in a number of cases. For instance, if the university no longer needs the data, or if the person withdraws consent previously given.
-
Make your data FAIR
Contemporary data management practices rest on the four principles: findability, accessibility, interoperability, and reusability.
-
Storage and data recovery
As a standard, your workplace comes equipped with a limited amount of disk space. We offer a number of options for extending your disk space. In addition, ISSC can help you recover lost files.
-
Data analysis software
Data analysis is the process of converting raw data into information that can be used to answer research questions. To help you interpret your raw data SOLO Research and Lab Support supports different types of data analysis software.
-
Data Management Plan
Firstly, Data Management Plan (DMP) is after all a plan, so you must carry it out!
-
Physiological data acquisition
How does a human subject respond physiologically during an experiment? Measuring these responses offers valuable data. Heart rate, brain activity, skin response and eye moment can al be measured using various types of equipment.
-
Collecting physiological data
How does a human subject respond physiologically during and experiment? Measuring these responses offers valuable data.
-
Protection of Aviation Security Through the Establishment of Prohibited Airspace
PhD defence
-
Long-term data retention
Once the research has been completed, the research data must be retained securely for the long term. This means that the integrity, availability and – if required – confidentiality of the data must be guaranteed.
-
One-off data processing
Are you handling personal data just once, for instance when taking the minutes of a meeting or organising an employee outing? You do not need to include this use in the data processing register if you stick to the following conditions.
-
Data storage
Your options for data storage may vary depending on factors such as size and sensitivity of the data or collaboration with partners outside the university. We are all responsible for data protection. To keep (personal) data as secure as possible, the university has established an information security…