Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

Research life cycle: 2.Research phase: Secure data

Laptop security

Zuyd laptop
On Zuyd-managed Windows 10 laptops, Microsoft's encryption software Bitlocker is installed and is by default active on the internal hard drives.

Own laptop
Do you use your own laptop? Make sure you have your own encryption software.

Anonymizing / pseudonymizing

1. Anonymizing

After application, it is no longer possible to trace data back to individuals, it is an irreversible process.
The GDPR does NOT apply to completely anonymous data!!

2. Pseudonymizing

Identifying data with a certain algorithm are replaced by encrypted data (the pseudonym). With the right key or additional data, the (personal) data can be decrypted and made readable, making it possible to trace back to individuals. This is a case of (the possibility of) reversibility.
The GDPR DOES apply to pseudonymised data!!

Secure data transmission

Do you want to send research data? Do this in a safe way:

The use of facilities such as Dropbox, WeTransfer, hotmail/gmail addresses, etc., is strongly discouraged. These services are not always open and clear about the documents they collect/send and how they deal with them. In the context of the GDPR, you need to know that your documents are secure.

USB stick / External hard drive

The use of USB sticks and external hard drives is strongly discouraged. If you must use these devices, encrypt with a password using Bitlocker. This manual describes how to do this in a few steps:

We strongly recommend the use of the safe Zuyd facilities: O-drive and/or ZuyData@figshare.
Want to know more? View this LibGuide. | Disclaimer | Over Zuyd Bibliotheek