Acknowledgements: The author thankfully acknowledges the useful contributions and comments made by Manuela Battaglini and Jure Lampe in relation to this section.<\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n
Without a doubt, video-conferencing has become an essential communication tool at all levels: personal, social, business…, and, of course, its impact is also notable in the field of scientific cooperation.<\/p>\n
This resource allows us to plan joint research and cooperation strategies, to benefit from the experience of other colleagues, thereby saving time and travel costs. Today, it is possible to prepare a research proposal at a distance, monitor the development of the project once it has been achieved, and discuss strategies and results, all via video conference.<\/p>\n
However, from the point of view of personal data protection, there are two fundamental aspects to be taken into account when organising a video conference: the security and confidentiality of the communications; and the protection of the personal data of those involved in a video conference. In this section, we deal with the issues related personal data protection, when preparing a video conference.<\/p>\n
\n\n
\n
DOs<\/strong><\/td>\n<\/tr>\n
\n
\n
\n
Ask your DPO for recommendations on video conferencing services.<\/li>\n
In case you have to choose yourself, pay close attention to the provider\u00b4s privacy policy.<\/li>\n
Pay attention to which Direct Personal Data is collected by the provider: You should be suspicious if more data is requested than strictly necessary to provide the service.<\/li>\n
Be aware of Personal Data Observed collected, and what is the purpose of such gathering.<\/li>\n
You should always be wary of ambiguous or empty clauses such as: “any data may be collected or disseminated, or retained indefinitely”.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n
\n\n
\n
DON\u2019Ts<\/strong><\/td>\n<\/tr>\n
\n
\n
\n
Mobile apps: do not install them without reading the privacy policy.<\/li>\n
If an app asks you to access content that is not directly related to the service they provide, do not use it.<\/li>\n
Do not use providers that do not identify in their Privacy<\/span> Policy the types of data they collect and how they use it.<\/li>\n
Avoid companies that have a large number of external service providers<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n
\n\n
\n
Checklist<\/strong><\/td>\n<\/tr>\n
\n
\n
\n
Check if there is a specific platform designated by your institution.<\/li>\n
Check if your institution has any specific policies in relation to video-conferencing tools.<\/li>\n
Check the privacy policy before using any tools.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n
The protection of the personal data of those involved in a video conference<\/a><\/h2>\n