Current facets (Pre-Master)
Generally, data at universities is classified as: public, internal, confidential or secret.
Indicative examples for personal data
Public information on public websites and in public publications.
Not intended for the public but at the same time not harmful, should it fall into the wrong hands.
Personal data (e.g. information about a person's economic position (credit/debit)), memo’s, instructions and guidelines.
Information which could harm people, organisations or governments.
Special Categories of personal data (e.g. Security Vulnerability rapports, Security Incident Rapports, information about a person's psychological, medical or criminal status).
Information that will immediately have severe consequence for people, organisations or governments.
Research on a highly sensitive topic, Highly Sensitive Note, Memo or Report for the Board (CvB).
If you work with sensitive data, contact the Research Support Office [email@example.com] for a quick data assessment (classified / secret / other) to ensure all necessary measures are taken.
For sharing data safely and securely, the EUR provides the SURFdrive service - the ‘safe Dropbox’. See here for info about SURFdrive. See here for the manual to install SURFdrive on your @wEURk workplace.
Encrypting documents and sharing your password
When you want to protect an Office document it is possible to encrypt your document. Here you will find a manual for encrypting Office documents. Also you will find recommendations for creating and sharing passwords.
When you want to protect an other type of document or a folder it is also possible to encrypt your document or folder. Here you will find a manual for encrypting documents and folders using the program 7-Zip. Here you will find a manual for encrypting a folder on MacOSX.
Encrypting the hard disc of your laptop (Windows / Mac)
If you work with data other than public data, and you work on a laptop, you must encrypt the hard disc of your laptop. If you use a laptop provided by the EUR, please contact us at firstname.lastname@example.org for practical assistance. Please expect the procedure to take 30 minutes.
If you are allowed to work on your own laptop (Bring Your Own Device), and you work with data other than public data, you must yourself see to it that the hard disc of your laptop is encrypted. See here for the manual for a laptop using Windows 7 and here for your Mac.