ECIS - Ethics Committee for Information Sciences



This page is to explain the ECIS committee process and required documentations.

Until very recently, ethical discussions were only relevant to fields of research in which research is conducted on humans, such as medicine and some social sciences. However, due to the increased involvement of humans as in (in)direct research objects in the Information Sciences (IS), these ethical discussions are also becoming important in this field. To guarantee the integrity of the researches and their research, a framework within to work is necessary to guarantee the quality and social relevance of research conducted under the umbrella of the Informatics Institute. A framework where the legal and ethical aspects of research need to be examined before, during and after the project. This will be done by the Ethical Committee for Information Sciences (ECIS), which is part of the Institute for Information Sciences of the University of Amsterdam.


The ECIS - Ethics Committee for Information Sciences advises the directors of the informatics/computer science institutes at UvA, VU and CWI regarding cases in research and education that require ethical evaluation and oversight. Additional info about these functions and requirements can be found here:
Additionally contextual information can be found in the KNAW publication:
and Scientific Advisory to the government report on Big Data in a Free and Secure Society: a (Dutch) Leidraad om te komen tot een praktijk van Responsible Disclosure:


The IvI ECIS core committee consists of:
Secretarial support:
    Brecht Schipper <B.C.Schipper@uva.nl>


Please see the documentation for the description of the processes. If the case is not described, find a member of the committee and explain the situation.

Documentation for case evaluation

  1. handboek-ecis-versie-1.2.pdf (Nederlands)
  2. handbook-ethics-version-1.2.pdf (English)
  3. Communication map


In all cases keep personal data under all circumstances encrypted, do not talk to others regarding vulnerabilities, and do not leak data or methods before the original problem can be solved in a reasonable time following procedures.

Previous committee members