1,628 search results for “data” in the Staff website
-
Directory structure and file naming
Think of a clear and consistent directory structure.
-
Report a potential incident immediately
Imagine you’ve accidentally sent a CV to the wrong email address or left your laptop on the train; a momentary lapse of concentration can result in a data breach or security incident. By responding quickly, we can limit the damage and consequences for privacy: both your own and the university’s. You…
-
Tooling
Standard software is provided through the Software Centre.
-
Privacy and secure collaboration
Teachers work with sensitive information on a daily basis: student data, exam information and communication about education, for example. It’s essential to process this information securely and to protect yourself and your students against digital risks, such as phishing, unauthorised access and other…
-
Interview with Jaap van den Herik by BNVKI
Recently, Jaap van den Herik, professor emeritus Law and IT, was interviewed by the BNVKI (Benelux Association for Artificial Intelligence).
-
ICT and research
ICT plays an important role in scientific research. With the help of ICT it is easier to collect, manage, analyse and share complex research data.
-
Datamanagement
Data management refers to creating, saving, updating, making available, archiving and long-term storage of research data. The final goal of this process is often defined in terms of the FAIR principles: 'Findable, Accessible, Interoperable and Re-usable'.
-
Tools and tips for working securely
Curious to find out how you can contribute to a safe working environment? Then keep reading to discover our tips for working securely. They will help you to work more safely in specific situations. This section contains tools and tips to promote safe working habits in specific situations.
-
Metadata
Keep in mind a fellow researcher: someone who knows your area of expertise, but not necessarily as well as you do. Are your files understandable as they are, or do they need cleaning enhancement? Keep the right balance: make sure the metadata is sufficient for reuse, but do not get carried away and…
-
Think carefully before sharing anything
Sharing data and documents with colleagues or other organisations can be useful, but it can also entail various risks. You should therefore think carefully before sharing anything, and always ask if you’re not sure whether sharing is permitted.
-
Project Management
Create an inventory of all the people/roles (potentially) involved in the research project, including their roles and responsibilities (concerning the research data), as well as how they relate to the university.
-
Privacy Service Point
The Privacy Service Point is responsible for the application of and compliance with privacy legislation.
-
Qualtrics
Qualtrics survey software allows you to create online questionnaires for your research. It provides various question types, branch logic and the possibility to export results to statistical software, such as SPSS.
-
Open Access and access rights
Complete open access may not be possible because of various reasons: research ethics, privacy legislation, intellectual property, continuing research. The Easy archive at KNAW/DANS provides various access levels to deal with these issues.
-
Information Security
Taking care of storing your data and making timely backups is a crucial step of good research data management practices because it is not possible to archive something that has been lost.
-
Policies, codes of conduct, and laws
There are regulatory policies and recommendations in place, which you should comply with and take into consideration during your research.
-
Research Ethics
The Ethics Committee gives binding advice on ethical issues in research. This may be the case when you handle sensitive data. But also in other cases, like handling human remains, the Ethics Committee may require you to take steps to protect your data, which will implicate Research Data Management.
-
Research Support @ FSW
We are a multidisciplinary network that advises and guides FSW researchers at every stage of their research journey.
-
Reporting incidents
Information security is essential for Leiden University. This means not only that we deal with (sensitive) information in a secure and conscious manner, but also that incidents are reported as soon as possible. You can read below how to report incidents.
-
Creating web forms
If you need to create online forms, you can do this using Formdesk. This tool can be used for registrations for events and for asking for feedback.
-
Editing room 1A45
Want to edit video, photo and audio material with Adobe Creative Cloud apps? You can do so on the computers in editing room 1A45.
-
SAILS Lunch Time Seminar
Lecture
-
Use safe tools
Using secure tools ensures that information and personal data are well protected. ‘Tools’ refers to software that can help you perform your work efficiently, such as email software or a file-sharing system. To quickly see whether a specific tool is permitted, check the tool picker!
-
Quantitative Empirical Research Methods in Law
-
File formats
For people to reuse your data, the file formats you publish them in must be “open” as well.
-
Forms and regulations
The PhD Regulations are established by the Doctorate Board. The regulations set out who is eligible to be a PhD candidate, what the tasks of the supervisor and co-supervisor are and which criteria the dissertation has to meet.
-
Datamanagement
Data management refers to creating, saving, updating, making available, archiving and long-term storage of research data. The final goal of this process is often defined in terms of the FAIR principles: 'Findable, Accessible, Interoperable and Re-usable'.
-
Lab facilities and protocols
Leiden University has high-quality research facilities and laboratories for education and research.
-
Working securely online
All employees of Leiden University handle data or personal information. And it is very likely that, at some point or another, everyone will receive a suspicious email or have to deal with other attempts by hackers to gain access to this data. Some cybercriminals try to obtain data because they want…
-
Academic integrity
The integrity and reliability of academic research are of fundamental importance to the University. All parties, both within and outside the University, must be able to have confidence that our research is conducted in a scrupulous, fair, verifiable, impartial and independent manner.
-
Mobile telephony
If you need a mobile telephone or a mobile subscription or data-only subscription, can apply for it via the helpdesk portal. You can also contact the helpdesk portal if you need to change or cancel a mobile or data-only subscription.
-
Registration and contract
As you are a new Leiden University staff member, a number of things must happen before we can draw up your contract and activate your ULCN account. This is also the case if you are affiliated with the university as external staff, for example if you were hired as a freelancer.
-
Camera surveillance
Whether you’re a student, staff member or external service provider, it’s important that you feel safe at Leiden University. A range of measures are in place to assure safety and security in all the university’s buildings and grounds.
-
Printing through Webprint no longer possible: use Papercut
ICT, Organisation
-
Prepare and write
Our Research Funding Community continuously gathers intelligence that helps with preparing proposals efficiently and to give them the necessary competitive edge. All grant advisors are happy to share this information, and to guide you throughout the process. For quick reference, this page summarises…
- Ethics, RDM and Privacy
-
Application forms
Did you forget your password and do you want to request a new one? Do you want to modify storage for a workgroup, including access rights? Or do you want to submit another request for our ICT services or products? Please use the forms below.
-
Teaching academic integrity
Within all bachelor’s and master’s programmes, depending on the type of programme, attention is paid to ensuring that academic research is carried out scrupulously. For each programme, this is done in a way that is appropriate for the discipline in question.
-
Information for researchers
Here you will find additional information about SOLO's services and links to useful websites.
-
Research and Lab Support
SOLO Research and Lab Support provides assistance to researchers in various stages of their research.
-
Version Management
Determine how you keep track of the final version and intermediate versions.
-
Check it: work privacy and security smart
We can all do our bit to keep our information and personal data safe. It’s easier than you think and is often about the small things. Working privacy and security smart means protecting your own data and that of your colleagues. Want to know how best to go about that? Check it out here!
-
Workshops and training courses
Why do I have to keep entering a code to log in? How can I be sure that I am keeping my workplace safe? How can I identify phishing emails? And how do I know if something is a data breach?
-
Lock your screen
Locking your screen before leaving your desk: it’s so easy to do but we often forget. This quick action protects both you and the university. Do you always lock your screen when you leave to get a coffee, walk to the printer or chat with a colleague in the corridor?
-
Education Dashboard
Leiden University’s Education Dashboard contains key data for all the university’s degree programmes. Please note that at present the dashboard is only available in Dutch. For more information see the Dutch staff website or send an email to cijfers@bb.leidenuninv.nl.
-
Privacy and security officers
You can contact the privacy or security officers with questions about privacy or data security.
-
Ethics committees
Ethics committees advise researchers on ethical issues relating to their research. For example, whether the research meets the criteria for ethically responsible conduct. There are a number of ethics committees within Leiden University.
-
Report incidents and accidents
What are you supposed to do if something goes or has gone wrong? Whether it be a break-in, an accident or an unsafe situation of any other kind, or data breach or cyber-attack; please read how to report each type of incident below.
-
Activating and managing your account
You can activate and manage your account via Account Services. To make the best use of Account Services, it is important that you set your account properly the first time you use it.
-
Sharing and sending files
If you wish to share files with colleagues within or outside the university, you can save these files in the cloud. You can do this with Office 365 or OneDrive. If your files are too large to be send by e-mail, you can use SURFfilesender.