Theme 4: Processing information
The university has a lot of information at its disposal, a large part of which is confidential. On the one hand, we as an organization want to be as transparent as possible, but there are situations in which confidentiality is necessary. There are all kinds of rules regarding the protection of personal data and copyrights and portrait rights.
Careless processing of this (confidential) information damages the reputation of Tilburg University, the user, and/or the owner of the information. There may also be a violation of laws or regulations, such as the General Data Protection Regulation.
Our 5 ground rules for processing information
Functional useYou only use information for the performance of your job
You only use information that you possess from your position or studies for the performance of your job within the framework of the law. This means that you do not unjustly use or misuse information that you have at your disposal in the context of your job or studies; not for yourself and not for others.
ConfidentialityYou treat confidential information as such
You treat confidential information as such. You must never give, distribute, or disclose any information that is confidential or of which you may suspect confidentiality.
PrivacyYou respect everyone’s privacy
You respect everyone’s privacy. You act in accordance with the Social Media Guidelines and the Privacy & Personal Data Protection Policy. If you want to take pictures or make (video) recordings of a person or lecture and/or share information about someone or a presentation, you must ask permission from those involved.
Intellectual propertyYou respect the intellectual property of others
You respect the intellectual property of others. If you want to use something, you have to request permission and/or mention the source. Intellectual property is a collective name for a number of rights, such as copyright or portrait rights. You cannot just use other people’s texts or photos. These are protected by these rights and you must have permission to use them. This also applies to images found on the Internet.
Adequate protectionYou take good security measures to protect information
You take good security measures (during and outside working hours) to protect information. So: clean desk, clear screen, lock room.
Never leave documents and data carriers (such as a laptop, telephone, or USB stick) unattended. In addition, you ensure that computers are properly secured, with the latest updates of operating software, virus scanner, and/or encryption. This also applies to a private computer or telephone that you use for Tilburg University.
What if things go wrong?
You feel that you or one of your fellow students or employees of Tilburg University may be negligent in dealing with information. Think, for example, of violating confidentiality, not guaranteeing privacy, or not respecting intellectual property. This may happen, for example, by not taking proper security measures. security measures.
Roadmap: where can you go?
Download the roadmap
Where you can go when, you will also find in the roadmap