The 25 individual Fontys institutes collectively offer more than 100 courses – bachelor’s, master’s, associate degrees, as well as training programmes and courses for the business market – and carry out practice-based research, each in collaboration with and for its own professional field. The institutes and the Executive Board are supported by seven departments in the areas of finance, IT, marketing and communication, personnel and organisation, accommodation and facilities, education and research, and student services.
All Fontys Associate degrees and Bachelor and Master’s programmes are accredited by NVAO (Accreditation Organisation of the Netherlands and Flanders).
Rules & regulations
TER (Teaching and Examination Regulations)
In the Teaching and Examination Regulations (TER) you will find all information about the study programme and the examination. In this document you will also find the information about the entry requirements and the offered study career counselling.
Choose the institute which offers your study programme and download the pdf document with the Teaching and Examination Regulations 2019-2020 or 2020-2021. The composition of the Examination Board can be found in a separate appendix or in article 38 of the TER.
Fontys University of Applied Sciences believes the security of its information systems is very important. Despite every effort to provide careful system security, there are always points for improvement and a vulnerability may occur. You can report this vulnerability to Fontys.
Please inform us if you discover any vulnerabilities in one of our information systems. This will enable us to take measures as soon as possible. We would like to work with you to better protect our users and systems.
No invitation to scan actively
The Fontys 'Responsible Disclosure' policy is not an invitation to actively and extensively scan our network or our systems for vulnerabilities, since we monitor our company network ourselves. There is a good chance that we will pick up your scan and that our security team will investigate it, which could lead to unnecessary costs.
It is quite possible that, during your investigation, you will perform actions which are punishable under criminal law. If you have complied with the conditions below, we will not take legal action against you. However, the Public Prosecutor's Office retains the right to decide whether it will take legal action against you. Read the Public Prosecutor's website.
Our request to you
Report your findings as soon as possible via the Responsible disclosure report form to prevent information from falling into the wrong hands.
Do not misuse the vulnerability found by, for example:
- downloading more data than is necessary to prove the data breach
- changing or deleting the information
- Be especially cautious with regard to personal data.
- Do not share this vulnerability with others until it has been remedied.
- Do not attack the physical protection or applications of third parties, or use social engineering, (distributed) denial-of-service, malware or spam.
- Provide enough information to reproduce the vulnerability, so we are able to remedy it as soon as possible. Usually, the IP address or the URL of the systems affected and a description of the vulnerability and the actions performed are sufficient, but more information may be necessary in the case of more complex vulnerabilities.
We guarantee that
- We will respond within 5 working days with our assessment of the report and an expected date for a solution.
- We will treat your report confidentially and will not provide your personal data to third parties without your permission, unless this is necessary for the fulfilment of statutory obligations.
- We will keep you informed on the progress of the solution for the vulnerability.
- You can make your report anonymously or under a pseudonym. However, if you do so we are not able to contact you about, for instance, the next steps, the progress of containing the breach, publication or any possible reward for the report.
- If you wish, when the vulnerability is reported we will state your name as the person who discovered the vulnerability.
- We aim to solve all the problems as soon as possible and to inform all the parties involved. We welcome involvement in any publication about the vulnerability, after it has been remedied.
Code of conduct
As an institution in higher education, Fontys University of Applied Sciences follows the Code of conduct for international students. This code relates to how the institution deals with international students and to the education and services offered.