Data protection statement for university’s wireless networks

IT Center, University of Helsinki 18.6.2020

Data controller
University of Helsinki
IT Center
PL 28 (Koetilantie 3)
00014 Helsingin yliopisto
02941 911
 

Person in charge of registry matters
Juha Myllys
PL 28 (Koetilantie 3)
00014 Helsingin yliopisto
02941 40163
atk-verkko@helsinki.fi
 

Name of the register
Data protection statement for university’s wireless networks
 

Intended use of the register
The information collected from the users of the University of Helsinki’s wireless networks is used for the maintenance and development of wireless networks and for the investigation of any faults, problems or misuse.
 

Data contents of the register
For devices connected to the University of Helsinki’s wireless network, user-specific information is stored in the register as follows:

  • address of the device (MAC address)
  • IP address of the device
  • username (if required)
  • general information about the device used
  • information about the wireless network used
  • connection protocol used by the device
  • login time
  • duration of connection
  • wireless connection strength
  • amount of data transferred during the session
  • location at building level
  • information about the base station to which the user is connected
     

Regular disclosure of data
Data is not disclosed outside of the European Union or the European Economic Area. Data collected from the University of Helsinki’s wireless networks can be disclosed to other registers produced by the University of Helsinki’s IT Center. In order to develop and monitor operations, the contents of the register are used in reports. However, no individuals can be identified from the reports.
 

Security principles for the register

  • data is stored on University of Helsinki’s server located in a locked data center with restricted access
  • data can only be viewed by an authorised employee who is identified by a username and password
  • users’ rights to system information are limited through access roles
  • securing the operation of equipment and telecommunications is based on the IT architecture of the University of Helsinki
  • data is stored in electronic form only