Erasmus University Rotterdam promotes secure use of IT facilities: "Safe Online – Make it happen!"
Safe Online – Make it happen!
Important information like exams, research information or privacy sensitive data needs to be protected, no matter how and where it is stored. The university takes appropriate measures to make this possible, but each student and staff member has to contribute to safe handling of data as well. The menu provides access to additional information on different topics.
In addition you can visit various websites, including:
The up to date website provided by the Dutch government (Dutch only).
Information for higher education
Information security policy
The EUR Information security policy aims to prevent security incidents, to minimize the impact of incidents and to ensure the continuity of business operations.
To enable working and studying in a secure environment, the EUR’s regulations on the use of Internet and ICT facilities apply:
- Use Policy - for students
- Use Policy - for employees
The Personal Data Protection Act (Wet bescherming Persoonsgegevens) requires any organization in the Netherlands to carefully deal with personal data. If you think that personal data has been unintentionally published or processed, report it immediately to the Service Desk. Or check out the data breach procedure.
Personal data involves anything that relates to a natural person, including:
- Name and address
- Gender and date of birth
- Phone numbers
- E-mail or other electronic addresses
- (copies of) credentials
- Access data
- Financial records
- Social security number
Detailed information is available on the Dutch DPA (Data Protection Authority) website, though large parts of the website are available only in Dutch.
Incidents and security breaches
No security is ever perfect – technology is constantly evolving and both researchers and criminals are looking for errors in software, security leaks and other defects.
When you become aware of a security incident, recognize a flaw in our software or EUR webpages or find some other security issue, we like to be informed about this. Please use the Vulnerability Reporting Form.
Incident reports can be submitted to the Service Desk. Additionally, shortcomings in security or notifications that need confidential handling can be submitted to the Computer Emergency Response Team (CERT) at email@example.com
More information on reporting information security incidents and our follow up can be found as responsible disclosure.