iCIS Intra Wiki
categories:             Info      -       Support      -       Software       -      Hardware       |      AllPages       -      uncategorized

Difference between revisions of "Data Protection Policy"

From ICIS-intra
Jump to navigation Jump to search
 
(5 intermediate revisions by the same user not shown)
Line 5: Line 5:
 
This page contains a basic overview of information from the Radboud University [http://www.ru.nl/privacy/english/ Privacy & Security ] website.
 
This page contains a basic overview of information from the Radboud University [http://www.ru.nl/privacy/english/ Privacy & Security ] website.
  
== Information security: Cybersave yourself! ==
+
== Information security ==
  
 
Source: https://www.ru.nl/ict-uk/general/securing-your-information/  
 
Source: https://www.ru.nl/ict-uk/general/securing-your-information/  
Line 25: Line 25:
 
Source: https://www.ru.nl/privacy/english/protection-personal-data/personal-data/
 
Source: https://www.ru.nl/privacy/english/protection-personal-data/personal-data/
  
Every person has a right to privacy and careful handling of his or her personal data. The Personal Data Protection Act specifies how personal data should be processed and automated. Personal data must, for example, be protected against loss and unlawful processing. Also, companies and organisations are only allowed to store data for a legitimate aim and not longer than necessary.
+
'''Question:''' What data is considered Personal data?
 +
 
 +
'''Answer:''' Roughly, personal data means data that can be traced to an individual, such as name, IP address, telephone number, employee or student number, study results or your bank account number.
 +
 
 +
Every person has a right to privacy and careful handling of his or her personal data. '''The Personal Data Protection Act''' specifies how '''personal data''' should be processed and automated. Personal data must, for example, be protected against loss and unlawful processing. Also, companies and organisations are only allowed to store data for a legitimate aim and not longer than necessary.
 
4 guidelines for dealing with personal data
 
4 guidelines for dealing with personal data
  
Line 34: Line 38:
 
* Be transparent when collecting personal data en tell for what purpose you collect them.
 
* Be transparent when collecting personal data en tell for what purpose you collect them.
 
* Make sure the collected personal data are well secured.  
 
* Make sure the collected personal data are well secured.  
 +
 +
More information can be found on
  
''' What data is considered Personal data? '''
+
* [http://www.ru.nl/privacy/english/ the Privacy- and security website of Radboud University].
 
 
Roughly, personal data means data that can be traced to an individual, such as name, IP address, telephone number, employee or student number, study results or your bank account number.  
 
 
 
More info:
 
 
* [https://www.ru.nl/en/staff/services/campus-facilities/work-and-study-support-services/ict/security/privacy-and-using-personal-information Privacy and using personal information ]
 
* [https://www.ru.nl/en/staff/services/campus-facilities/work-and-study-support-services/ict/security/privacy-and-using-personal-information Privacy and using personal information ]
 +
* [https://www.ru.nl/en/staff/services/campus-facilities-buildings/ict/reporting-a-data-breach-or-security-incident Reporting a data breach or security incident]
 
* [https://www.ru.nl/en/regulations/personal-data-protection-regulations Personal Data Protection Regulations]
 
* [https://www.ru.nl/en/regulations/personal-data-protection-regulations Personal Data Protection Regulations]
  
Line 47: Line 50:
 
Source: https://www.ru.nl/en/staff/services/campus-facilities-buildings/ict/security/sharing-and-storing-files-safely
 
Source: https://www.ru.nl/en/staff/services/campus-facilities-buildings/ict/security/sharing-and-storing-files-safely
  
When sharing documents (working together) the only safe way you can do this is either by using Workgroup folders or  
+
When sharing documents (working together) the only safe way you can do this is either by using Workgroup folders (network shares) or  
Microsoft Teams.
+
Microsoft Teams (cloud storage).
  
 
For information about howto encrypt your files or your whole pc/laptop look at this wiki page about [[Encryption |  Encryption]].
 
For information about howto encrypt your files or your whole pc/laptop look at this wiki page about [[Encryption |  Encryption]].

Latest revision as of 22:40, 19 September 2024

RU POLICY: laptops must be encrypted!!


This page contains a basic overview of information from the Radboud University Privacy & Security website.

Information security

Source: https://www.ru.nl/ict-uk/general/securing-your-information/

Radboud University takes the security of information very seriously and puts adequate measures into effect to prevent identity fraud and the spreading of viruses or spam from happening.

Here are five tips you can follow up to become ‘cybersafe’:

View also other simple to-do's to guarantee your online privacy and protect your data.

Personal Data Protection Act

Source: https://www.ru.nl/privacy/english/protection-personal-data/personal-data/

Question: What data is considered Personal data?

Answer: Roughly, personal data means data that can be traced to an individual, such as name, IP address, telephone number, employee or student number, study results or your bank account number.

Every person has a right to privacy and careful handling of his or her personal data. The Personal Data Protection Act specifies how personal data should be processed and automated. Personal data must, for example, be protected against loss and unlawful processing. Also, companies and organisations are only allowed to store data for a legitimate aim and not longer than necessary. 4 guidelines for dealing with personal data

Four central theme's in the Personal Data Protection Act can be pointed out when it comes the dealing with personal data: goal limitation, data minimasation, transparency and security. It means you should follow these guidelines:

  • Document why and for what reason you save personal data and make sure the data will only be used for that specific purpose.
  • Don't save personal data any longer than necessary (often there are statutory retention periods) and only save those data that you really need for reaching your goal.
  • Be transparent when collecting personal data en tell for what purpose you collect them.
  • Make sure the collected personal data are well secured.

More information can be found on

Data Storage Policy

Source: https://www.ru.nl/en/staff/services/campus-facilities-buildings/ict/security/sharing-and-storing-files-safely

When sharing documents (working together) the only safe way you can do this is either by using Workgroup folders (network shares) or Microsoft Teams (cloud storage).

For information about howto encrypt your files or your whole pc/laptop look at this wiki page about Encryption.

RU POLICY: laptops must be encrypted!!

Security Do's

Source: Security Do's

DATA

  1. Lock your computer screen when you leave your workplace
  2. Encrypt your laptop
  3. Encrypt your USB-stick or external hard drive
  4. Encrypt sensitive files
  5. Use workgroup folders for working on documents with colleagues from other departments
  6. Use Microsoft Teams for online collaboration on files in a team (in the cloud)
  7. Send large files through SurfFileSender
  8. Use eduVPN to work securely from home
  9. Add the Radboud University disclaimer to you email signature
  10. Empty folder such as 'Downloads' and 'Temp' regularly

IDENTITY

  1. Use a strong password
  2. Never share your password, but delegate permissions instead
  3. Activate the spam filter
  4. Watch out for phishing
  5. Be alert while surfing the internet on where you might leave information
  6. Protect your identity on social media

DEVICES

  1. Install a firewall on your computer
  2. Install anti virus software on your computer
  3. Prevent your USB-stick from spreading malware
  4. Make sure you protect your mobile devices
  5. Check wireless networks on their safety

More information