192 search results for “privacy” in the Staff website
-
Sabine Witting
Faculteit Rechtsgeleerdheid
s.k.witting@law.leidenuniv.nl | +31 71 527 8838
-
Help and support
Are you looking for a contact person, because you for instance have a question about privacy, or you need a ULCN guest or uSis account? Or do you need a manual or application form? Below you will find more information.
-
Simone van der Hof
Faculteit Rechtsgeleerdheid
s.van.der.hof@law.leidenuniv.nl | +31 71 527 8838
-
Personal data
As a university employee, you probably work with personal data. That is not just names and telephone numbers – it can also include things like cookies. How can you make sure you are working in a privacy-proof way?
-
Gianclaudio Malgieri appointed to the Programme Committee of PLSC
Gianclaudio Malgieri, Associate Professor of Law and Board member at eLaw, has been appointed to the Programme Committee of PLSC, the Privacy Law Scholarship Conference, one of the world's most attended academic privacy conferences. Gianclaudio is the only representative from a Dutch university and…
-
'GDPR is no excuse for not tracing children placed in care'
The GDPR privacy legislation is no impediment to handing out sanctions to Russian oligarchs or reuniting children placed in care with their parents, says privacy experts Anna Berlee, Marlies van Eck, Simone van der Hof, Simone Huting, Friederike van der Jagt and Jeroen Terstegge.
-
The Awaretrain learning platform
Do you want to improve your knowledge about privacy and working securely? And make sure that you never get caught out by a phishing e-mail, and that your passwords are strong? Then start working through the cybersecurity and privacy e-learning modules on Awaretrain.
-
Data processing agreement
If you bring in a (new) person who will be processing personal data for you, this person is not allowed to use this information for his or her own purposes. You need to formalise this in a data processing agreement. The university will usually have an agreement in place.
-
‘Supervision of the fight against cybercrime is poorly regulated'
Investigation services and cyber criminals both make grateful use of the opportunities offered by digital technologies. Both groups' use of these services leads to breaches of privacy for citizens. The current legislation falls short in providing protective measures, is the conclusion reached by Professor…
-
'Legislation to reveal identity internet troll also conceivable in the Netherlands'
Australia wants to introduce a law that makes it possible to demand the identity of anonymous internet trolls. Is this be conceivable in the Netherlands?
-
Success for Leiser and Yang at BILETA
Dr Mark Leiser, Assistant Professor at eLaw, and Wen-Ting Yang, former Law And Digital technologies student, won the Best Paper award at BILETA, the United Kingdom’s largest tech and legal education conference.
-
Simone van der Hof in podcast on GDPR and children’s rights
In a podcast of the Netherlands Internet Governance Forum (NL GF) and the Safer Internet Centre Nederland, Simone van der Hof, Professor of Law and Digital Technologies at Leiden University and Thijs Hannema, a lawyer at Kennedy van der Laan, discuss online privacy of children.
-
Bart Custers on BBC News about Uber’s Greyballing
In just over a decade, Uber has revolutionised how we move around our cities. The ride-hailing app was a game-changer: you just tapped your phone and a cab would find you. You even paid through the app. However, some of the Uber’s more controversial practices have triggered the interest of law enforcement,…
-
Microsoft Authenticator
After entering your username and password in Teams, Office 365 and OneDrive, you need to confirm your login through the Microsoft Authenticator app. This is an extra security step (multifactor authentication).
-
Security
The University aims to ensure a safe and secure (digital) environment. We all share the responsibility for protecting information, ourselves and the University. We encourage you to find out about safe working practices, a safe work environment and secure management of sensitive information. .
-
Storage and data recovery
As a standard, your workplace comes equipped with a limited amount of disk space. We offer a number of options for extending your disk space. In addition, ISSC can help you recover lost files. You can also securely store your files in the cloud via OneDrive and Teams. Whichever storage you use, be aware…
-
eLaw Conference: eLaw Symposium (20 June) and AI & Data Protection Conference (21 June) – Call for Abstracts
Conference
-
Bart Custers on using genealogical DNA in criminal cases
The Public Prosecutor's Office (OM) and the Netherlands Forensic Institute (NFI) want to use private DNA databases for genealogical research in criminal investigations. The method could be used in serious criminal cases that have stalled and it is already being used in investigations abroad. Whether…
-
Datamanagement
Data management refers to creating, saving, updating, making available, archiving and long-term storage of research data. The final goal of this process is often defined in terms of the FAIR principles: 'Findable, Accessible, Interoperable and Re-usable'.
- Zoom
-
Tools and tips for working securely
Curious to find out how you can contribute to a safe working environment? Then keep reading to discover our tips for working securely. They will help you to work more safely in specific situations. This section contains tools and tips to promote safe working habits in specific situations.
-
Research using personal data
If your research project involves collecting private or otherwise sensitive data, you must ensure adequate data protection measures are taken. Research must be conducted in accordance with the General Data Protection Regulation (GDPR). In terms of patient data, for instance, when used for research carried…
-
‘Standing Room Only’ at eLaw’s CPDP Panel on 'Dark Patterns and Data-Driven Manipulation'
With the conference circuit slowly reopening after Covid forced almost all academic interactions online, thousands of conference attendees descended on Brussels for Europe’s largest technology conference. eLaw’s annual sponsorship of one of the many CPDP conference panels brought a diverse range of…
-
eLaw Summer School “Regulating AI and data in the age of EU digital reforms” - 24-28 June, Leiden (Registrations are open)
Course, Summer School
-
Be aware of the risks of using chatbots like ChatGPT in your work
Security
-
How cyber safe are you? Take the survey and you could win an iPad
Security
-
Prevent children becoming victims of a data-driven world
It is becoming increasingly common to collect data from children and young people through digital means. The impact of this so-called ‘dataveillance’ on children, who are monitored from birth via smartphones and Fitbits, is great.
-
Bart Schermer about attack on citizens' right to demonstrate
Media outlets Investico, de Groene Amsterdammer and Trouw reported on the wide-scale collection by the Dutch police of personal data of demonstrators and their family members. Bart Schermer, Professor of Privacy and Cybercrime, commented on the issue.
-
Shopping by appointment: What happens to your personal data?
In the Netherlands it is now possible to visit non-essential shops if you make an appointment beforehand. But when you book an appointment you have to provide a lot of personal data. Are shops allowed to ask you for all this data and what happens to it?
-
Tinder match? Use facial recognition first
Recent developments in AI mean nobody is anonymous nowadays. The search engine PimEyes can find any photo of anyone that’s ever been placed online. No more Tinder Swindlers… or personal privacy. Everyone’s findable now. But is that even allowed?
-
Bart Custers on successor to DigiD
The Netherlands has DigiD, Portugal ‘de Cartão de Cidadão’, and Ireland MyGovID. Europe now wants one uniform digital identity card - the same for all Member States. For the Dutch government, the European successor to DigiD is a prestige project. State Secretary Van Huffelen wants to roll out an app…
-
One-off data processing
Are you handling personal data just once, for instance when taking the minutes of a meeting or organising an employee outing? You do not need to include this use in the data processing register if you stick to the following conditions.
-
Nursing mothers' rooms Pieter de la Court Building
Pieter de la Court, Wassenaarseweg 52, 2333 AK, Leiden
-
Data storage
Your options for data storage may vary depending on factors such as size and sensitivity of the data or collaboration with partners outside the university. We are all responsible for data protection. To keep (personal) data as secure as possible, the university has established an information security…
-
Security
All university locations and buildings are monitored and fitted with cameras. Read on to find out where to get advice about security for a building, person or event that may be at higher risk.
-
Quiet room at KOG available during Ramadan
Facility
-
Leiden Research Support Network Conference
Conference
-
Bart Custers in Trouw about new European digital identity
Europe is working full steam towards a digital identity for every EU citizen. And although it might be really useful to be able to hire a car everywhere in the EU with no hassles, Bart Custers, Professor of Law and Data Science at eLaw, the Center for Law and Digital Technologies, sees many loose ends.…
-
Factsheet Zoom
Zoom is available to LEI lecturers, staff and students.
-
Deleting personal data
Individuals have the right to instruct the university to delete their personal data in a number of cases. For instance, if the university no longer needs the data, or if the person withdraws consent previously given.
-
Forms and regulations
The PhD Regulations are established by the Doctorate Board. The regulations set out who is eligible to be a PhD candidate, what the tasks of the supervisor and co-supervisor are and which criteria the dissertation has to meet.
-
Data Management Plan course for PhD's
Didactics, Career development
-
Data Protection Day: are you keeping personal data safe?
Security
-
ICT
Good ICT resources are crucial for having a smooth working environment at your new place of employment. Here we briefly explain what you need and where you can find the most important ICT services.
-
Research funding
Leiden University offers a broad range of support for finding, writing, and applying for research funding. The first point of contact is your local grant adviser at your faculty/institute, who can guide you through the application process and answer any questions you may have. If your faculty/institute…
-
Update on internal and external cameras at KOG
Facility, Security
-
Bart Custers on DNA in cold cases
The Dutch Public Prosecution Service (OM) and the Netherlands Forensic Institute (NFI) want to use private DNA databases in an effort to solve deadlocked murder cases. Bart Custers, Professor of Law & Data Science at eLaw, Center for Law and Digital Technologies, expects that this is permissible from…
- Cybersecurity month: Follow good information security practices
-
Online security: be vigilant with free services
ICT
-
Anne Meuwese and Bart Custers in Trouw on Covid apps
The more people are vaccinated, the more society can slowly reopen. Technological developments, like the Covid passport and other apps, can play a role in this. Artificial Intelligence could help greatly in developing the vaccine passport and the Covid-19 exposure notification app, Anne Meuwese and…