Silhouet foto Miguel Bruna on Unsplash

Theme 4: Processing information

The university has a lot of information at its disposal, a large part of which is confidential. On the one hand, we as an organization want to be as transparent as possible, but there are situations in which confidentiality is necessary. There are all kinds of rules regarding the protection of personal data and copyrights and portrait rights.

Careless processing of this (confidential) information damages the reputation of Tilburg University, the user, and/or the owner of the information. There may also be a violation of laws or regulations, such as the General Data Protection Regulation.

On this site you will find the Code of Conduct in brief. The full text in the PDF is leading at all times.

Our 5 ground rules for processing information

  • Cijfer 1

    Functional use

    You only use information for the performance of your job

    You only use information that you possess from your position or studies for the performance of your job within the framework of the law. This means that you do not unjustly use or misuse information that you have at your disposal in the context of your job or studies; not for yourself and not for others.

  • Cijfer 2

    Confidentiality

    You treat confidential information as such

    You treat confidential information as such. You must never give, distribute, or disclose any information that is confidential or of which you may suspect confidentiality.

  • 3

    Privacy

    You respect everyone’s privacy

    You respect everyone’s privacy. You act in accordance with the Social Media Guidelines and the Privacy & Personal Data Protection Policy. If you want to take pictures or make (video) recordings of a person or lecture and/or share information about someone or a presentation, you must ask permission from those involved.

  • 4

    Intellectual property

    You respect the intellectual property of others

    You respect the intellectual property of others. If you want to use something, you have to request permission and/or mention the source. Intellectual property is a collective name for a number of rights, such as copyright or portrait rights. You cannot just use other people’s texts or photos. These are protected by these rights and you must have permission to use them. This also applies to images found on the Internet.

  • 5

    Adequate protection

    You take good security measures to protect information

    You take good security measures (during and outside working hours) to protect information. So:  clean desk, clear screen, lock room.

    Never leave documents and data carriers (such as a laptop, telephone, or USB stick) unattended. In addition, you ensure that computers are properly secured, with the latest updates of operating software, virus scanner, and/or encryption. This also applies to a private computer or telephone that you use for Tilburg University.

Further details and guidelines 

What if things go wrong?

You feel that you or one of your fellow students or employees of Tilburg University may be negligent in dealing with information. Think, for example, of violating confidentiality, not guaranteeing privacy, or not respecting intellectual property. This may happen, for example, by not taking proper security measures. security measures.

Roadmap: where can you go?

Student

In case of a dataleak:

  1. IT Support
  2. CERT
  3. Data Protection Officer

In case of an IT security issue:

  1. IT Support
  2. CERT

Other issues relating to the processing information:

  1. The person concerned
  2. Integrity coordinator
Employee

In case of a dataleak:

  1. Manager
  2. IT Support
  3. CERT
  4. Data Protection Officer

In case of an IT security issue:

  1. Manager
  2. IT Support
  3. CERT

Other issues relating to the processing information:

  1. The person concerned
  2. Manager
  3. Integrity coordinator
PhD Candidate

In case of a dataleak:

  1. IT Support
  2. CERT
  3. Data Protection Officer

In case of an IT security issue:

  1. IT Support
  2. CERT
Guest

In case of a dataleak:

  1. Commissioning party
  2. IT Support
  3. CERT
  4. Data Protection Officer

In case of an IT security issue:

  1. Commissioning party
  2. IT Support
  3. CERT

Other issues relating to the processing information:

  1. The person concerned
  2. Commissioning party
  3. Integrity coordinator
Download the roadmap

Where you can go when, you will also find in the roadmap