uu77

Tips for working securely

See what you can do to work securely and to protect your information and that of the university from malicious people.

As an employee of uu77, you get to see all sorts of information every day. You need this information to do your job. See what you can do to work responsibly and consciously, learn how to recognise cybercrime, and find out how to store and share data securely.
 

Handling information securely

Secure workspace

Software, tools and IT equipment

Suspicious situations

Handling information securely

The first thing you can do to protect your data is use strong/secure passwords. This is how you protect information on your computer and smartphone, but also your emails, social media and data in the cloud. Using multi-factor authentication (MFA) adds another layer of security. Store information in the right place, and make sure you know who you are or are not sharing the information with.

Sharing and storing information

Take a conscious approach to sending, sharing or disseminating (confidential) information. Store information in a central, well-secured location. By granting others access to that central location, you will know who can acquire the information. This will prevent data from floating around in your email, other people’s email and elsewhere. As a result, you will reduce the risk of data breaches and will ensure that your work can be transferred to colleagues during holidays or if you are away for a prolonged period of time. 

Processing personal data

The General Data Protection Regulation (GDPR) requires us to handle personal data with care. Any information that is traceable to an individual is personal data. If you want to start using new personal data, or to use existing personal data in a different manner, you must notify your department’s Privacy Officer. 

Secure workspace

We have an open policy when it comes to the buildings on our campus. This means you can go almost anywhere without additional access controls (subject to a few exceptions). Because of this open character, it is important that we pay attention to our belongings, information, people we know and do not know who are walking around and how we leave our workspaces. All departments work with confidential information. To prevent confidential information from being lost or ending up in the hands of others, it is important to handle information consciously every single day.

By workspace we mean the place where you are working at that time. So, this might be in the office, but also at home or on the go.

Software, tools and IT equipment

University devices are equipped with various basic programs. An overview of the available software can be found in the software list. As a student and employee, you can also use additional (low-cost or free) software.

If you are unable to install software, contact the ICT Helpdesk.
If you have any questions about how ICT supports or can support your work, contact the Information Management team.
 

Suspicious situations

There are all sorts of ways in which cyber criminals try to trap you. We are all familiar with phishing emails, but there are also many other means that criminals use to extract your data or take money from you.

RADje (rood figuurtje) in basishouding

Contact information

Do you have any questions? Or would you like more information? Do not hesitate to contact us.