481 search results for “online privacy” in the Staff website
-
Online hate speech undermines society
International Day of Education 2024 is dedicated to the role of education in countering hate speech. Assistant Professor Michael Klos says, 'When people are constantly derided online and that goes unpunished, they may start to withdraw from public discourse.'
-
Simone van der Hof joins Comparison Committee Online Content Moderation Project (PrOCoM)
Simone van der Hof is a member of the Comparison Committee set up as part of the Online Content Moderation Project (PrOCoM).
-
Wouter Hins
Faculteit Rechtsgeleerdheid
hins@wxs.nl | +31 71 527 8838
-
Eleftheria Makri
Science
e.makri@liacs.leidenuniv.nl | +31 71 527 2727
-
Oliver Tuazon
Faculteit Rechtsgeleerdheid
o.m.tuazon@law.leidenuniv.nl | +31 71 527 8838
-
Daniel Vale
Faculteit Rechtsgeleerdheid
d.s.vale@law.leidenuniv.nl | +31 71 527 8838
-
Els Kindt
Faculteit Rechtsgeleerdheid
e.j.kindt@law.leidenuniv.nl | +31 71 527 8838
-
Bart Schermer
Faculteit Rechtsgeleerdheid
b.w.schermer@law.leidenuniv.nl | +31 71 527 8838
-
Gera van Duijvenvoorde
Faculteit Rechtsgeleerdheid
g.p.van.duijvenvoorde@law.leidenuniv.nl | +31 71 527 8838
-
Gianclaudio Malgieri appointed to the Programme Committee of PLSC
Gianclaudio Malgieri, Associate Professor of Law and Board member at eLaw, has been appointed to the Programme Committee of PLSC, the Privacy Law Scholarship Conference, one of the world's most attended academic privacy conferences. Gianclaudio is the only representative from a Dutch university and…
-
How to make cryptographic techniques more efficient?
Sharing scientific data, transferring money, or sending other sensitive information online: with cryptography, applications make sure your data does not fall into the wrong hands. Mathematician Thomas Attema (CWI/TNO/Leiden University) helps with this. For his PhD research, he developed a new technique…
-
'AIVD loopt risico's door het gebruik van Israëlische hacksoftware'
De AIVD gebruikt omstreden hacksoftware van de Israëlische leverancier NSO Group, meldde de Volkskrant. In 2019 zou de telefoon van topcriminineel Ridouan Taghi er mee gehackt zijn.
-
'GDPR is no excuse for not tracing children placed in care'
The GDPR privacy legislation is no impediment to handing out sanctions to Russian oligarchs or reuniting children placed in care with their parents, says privacy experts Anna Berlee, Marlies van Eck, Simone van der Hof, Simone Huting, Friederike van der Jagt and Jeroen Terstegge.
-
Outcome report for 2nd Expert Workshop on the EU Proposed Regulation on Online Child Sexual Abuse published
Workshop brings multidisciplinary experts together to debate proposed detection technologies and their impact on fundamental rights.
-
Data processing register
A data processing register is a record of which personal data you process and who you share this data with. If you collect personal data for your research, you must record this in the data processing register.
-
Alan Sears
Faculteit Rechtsgeleerdheid
a.m.sears@law.leidenuniv.nl | +31 71 527 8154
-
Eduard Fosch Villaronga
Faculteit Rechtsgeleerdheid
e.fosch.villaronga@law.leidenuniv.nl | +31 71 527 2834
-
‘Supervision of the fight against cybercrime is poorly regulated'
Investigation services and cyber criminals both make grateful use of the opportunities offered by digital technologies. Both groups' use of these services leads to breaches of privacy for citizens. The current legislation falls short in providing protective measures, is the conclusion reached by Professor…
-
Malgieri's co-authored paper on PETs presented and published at FAccT Conference 2024
Gianclaudio Malgieri's paper entitled 'The unfair side of Privacy Enhancing Technologies: addressing the trade-offs between PETs and fairness', coauthored with Alessandra Calvi from Vrije Universiteit Brussel and Dimitris Kotzinos from Paris Cergy University, is set to be presented at this week's prestigious…
-
Help and support
Are you looking for a contact person, because you for instance have a question about privacy, or you need a ULCN guest or uSis account? Or do you need a manual or application form? Below you will find more information.
-
Personal data
As a university employee, you probably work with personal data. That is not just names and telephone numbers – it can also include things like cookies. How can you make sure you are working in a privacy-proof way?
- KNIR Online Open Day
-
Storage and data recovery
As a standard, your workplace comes equipped with a limited amount of disk space. We offer a number of options for extending your disk space. In addition, ISSC can help you recover lost files. You can also securely store your files in the cloud via OneDrive and Teams. Whichever storage you use, be aware…
-
Information Management
The SOLO Information Management department offers assistance in all kinds of matters concerning privacy, information and IT.
-
Contact details
You can contact us daily from 9:00 to 17:00 hrs.
-
Report a potential incident immediately
Imagine you’ve accidentally sent a CV to the wrong email address or left your laptop on the train; a momentary lapse of concentration can result in a data breach or security incident. By responding quickly, we can limit the damage and consequences for privacy: both your own and the university’s. You…
-
Keep track of the things you save: FGGA's data experts are here to help
Can you account for all the information and data in your possession? How do you deal with personal information? What do you do if there is a data breach? How do you save your data and are you aware of the regulations you need to adhere to while doing so? Where do you go if you are having ICT problems…
-
Data processing agreement
If you bring in a (new) person who will be processing personal data for you, this person is not allowed to use this information for his or her own purposes. You need to formalise this in a data processing agreement. The university will usually have an agreement in place.
-
Help desks
We want to make it easy for you to do your work at Leiden University. Find out how to submit queries, get help, log issues or request other services.
-
Swifties in PowNed video could take broadcaster to court
A controversial video in which PowNed asks Taylor Swift fans how far they would go for a meet-and-greet with the singer violates portrait rights according to Jeroen ten Voorde in Dutch newspaper ‘NRC’.
-
De gespannen relatie tussen privacy en cybercrime
Inaugural lecture
-
Mail migration to Exchange Online
ICT
-
Succesful online conference: Imperial Artefacts
On January 28 and 29, 2021 the conference ‘Imperial Artefacts: History, Law and the Looting of Cultural Property’ took place online. This first of its kind event at Leiden University was an interdisciplinary online conference and brought together (post-)colonial historians, legal historians, curators,…
-
Think carefully before sharing anything
Sharing data and documents with colleagues or other organisations can be useful, but it can also entail various risks. You should therefore think carefully before sharing anything, and always ask if you’re not sure whether sharing is permitted.
-
Cybersecurity: how can you reduce the risk of reputational damage to the University?
ICT
-
Bart Custers on using genealogical DNA in criminal cases
The Public Prosecutor's Office (OM) and the Netherlands Forensic Institute (NFI) want to use private DNA databases for genealogical research in criminal investigations. The method could be used in serious criminal cases that have stalled and it is already being used in investigations abroad. Whether…
-
ESOF2022 Online mini-symposium: The effect of the online world on adolescents
How do digital technologies affect adolescent mental health and resilience? How do we foster a secure online environment? How should we deal with increasing rates of online crimes among adolescents? During the mini-symposium ‘The effect of the online world on adolescents’, presented by the interdisciplinary…
-
Sander Hölsgens in NRC about the online game The Elder Scrolls Online
Sander Hölsgens is Assistant Professor, anthropologist and the editor of Gamer.nl. In NRC he talks about his favourite moments in the online game The Elder Scrolls Online. Despite a mediocre start in 2014, the computer game based on the Elder Scrolls series now has an active community of millions of…
-
Online safety: automatic forwarding to external email addresses no longer permitted
ICT
-
Online lecture: consent in research
Lecture
-
Display information clearly using Visio Online
ICT
-
Personal and professional development online: but how?
We can all look back on a turbulent year, a year in which we rapidly switched to working – and learning – online. Because pandemic or not, many staff members have continued to work on their development. Last year the Learning & Development team developed a wide range of online courses and training,…
-
Book presentation ‘Cybersecurity, Privacy and Data Protection in EU Law’
Lecture
-
Bart Custers
Faculteit Rechtsgeleerdheid
b.h.m.custers@law.leidenuniv.nl | +31 71 527 8838
-
Tools and tips for working securely
Curious to find out how you can contribute to a safe working environment? Then keep reading to discover our tips for working securely. They will help you to work more safely in specific situations. This section contains tools and tips to promote safe working habits in specific situations.
-
Trial access to Globe Law Online
Library
-
‘Standing Room Only’ at eLaw’s CPDP Panel on 'Dark Patterns and Data-Driven Manipulation'
With the conference circuit slowly reopening after Covid forced almost all academic interactions online, thousands of conference attendees descended on Brussels for Europe’s largest technology conference. eLaw’s annual sponsorship of one of the many CPDP conference panels brought a diverse range of…
-
Research using personal data
If your research project involves collecting private or otherwise sensitive data, you must ensure adequate data protection measures are taken. Research must be conducted in accordance with the General Data Protection Regulation (GDPR). In terms of patient data, for instance, when used for research carried…
-
Results of first online strategic plan dialogue
One of the aims in the development of the university’s new strategic plan is to foster a dialogue between as many students, staff and external stakeholders as possible about which topics and ambitions should be included in the plan. At the beginning of May we therefore invited all our students and staff…
-
Security
The University aims to ensure a safe and secure (digital) environment. We all share the responsibility for protecting information, ourselves and the University. We encourage you to find out about safe working practices, a safe work environment and secure management of sensitive information. .