Theme 4: Processing information
The university has a lot of information at its disposal, a large part of which is confidential. On the one hand, we as an organization want to be as transparent as possible, but there are situations in which confidentiality is necessary. There are all kinds of rules regarding the protection of personal data and copyrights and portrait rights.
Careless processing of this (confidential) information damages the reputation of Tilburg University, the user, and/or the owner of the information. There may also be a violation of laws or regulations, such as the General Data Protection Regulation.
On this site you will find the Code of Conduct in brief. The full text in the PDF is leading at all times.
Our 5 ground rules for processing information
-
Functional use
You only use information for the performance of your jobYou only use information that you possess from your position or studies for the performance of your job within the framework of the law. This means that you do not unjustly use or misuse information that you have at your disposal in the context of your job or studies; not for yourself and not for others.
-
Confidentiality
You treat confidential information as suchYou treat confidential information as such. You must never give, distribute, or disclose any information that is confidential or of which you may suspect confidentiality.
-
Privacy
You respect everyone’s privacyYou respect everyone’s privacy. You act in accordance with the Social Media Guidelines and the Privacy & Personal Data Protection Policy. If you want to take pictures or make (video) recordings of a person or lecture and/or share information about someone or a presentation, you must ask permission from those involved.
-
Intellectual property
You respect the intellectual property of othersYou respect the intellectual property of others. If you want to use something, you have to request permission and/or mention the source. Intellectual property is a collective name for a number of rights, such as copyright or portrait rights. You cannot just use other people’s texts or photos. These are protected by these rights and you must have permission to use them. This also applies to images found on the Internet.
-
Adequate protection
You take good security measures to protect informationYou take good security measures (during and outside working hours) to protect information. So: clean desk, clear screen, lock room.
Never leave documents and data carriers (such as a laptop, telephone, or USB stick) unattended. In addition, you ensure that computers are properly secured, with the latest updates of operating software, virus scanner, and/or encryption. This also applies to a private computer or telephone that you use for Tilburg University.
Further details and guidelines
What if things go wrong?
You feel that you or one of your fellow students or employees of Tilburg University may be negligent in dealing with information. Think, for example, of violating confidentiality, not guaranteeing privacy, or not respecting intellectual property. This may happen, for example, by not taking proper security measures. security measures.
Roadmap: where can you go?
Student
In case of a dataleak:
In case of an IT security issue:
Other issues relating to the processing information:
- The person concerned
- Integrity coordinator
Employee
In case of a dataleak:
- Manager
- IT Support
- CERT
- Data Protection Officer
In case of an IT security issue:
- Manager
- IT Support
- CERT
Other issues relating to the processing information:
- The person concerned
- Manager
- Integrity coordinator
PhD Candidate
In case of a dataleak:
In case of an IT security issue:
Guest
In case of a dataleak:
- Commissioning party
- IT Support
- CERT
- Data Protection Officer
In case of an IT security issue:
- Commissioning party
- IT Support
- CERT
Other issues relating to the processing information:
- The person concerned
- Commissioning party
- Integrity coordinator
Download the roadmap
Where you can go when, you will also find in the roadmap