Everyone faces the risk of having their identity stolen by those in Jack's shady underworld. There are important things that you can do to protect your own personal identity and there are critical tasks that anyone who works with university data must be aware of.
Identity theft criminals are always looking for new ways to get your personal information. This can range from digging though your trash to sending malicious e-mail messages to deceive you. There are important steps to take to make sure your personal information, such as credit card numbers, bank account information, Social Security Number, passwords, or other sensitive information, is not exposed. Here are some recommendations from the FTC and others to help protect you against identity thieves.
If you get a message that is phishing for personal information, contact the IT Service Center (helpdesk@uccs.edu or 719-255-3597) to report it.
CU employees have access to, and are responsible for protecting, a wide variety of sensitive information. Unauthorized exposure of information such as student academic records, medical information, credit card information, and social security numbers can have a harmful affect on people's lives. Failure to take care of this information places people at risk of identity theft, misuse of personal funds, or unauthorized modification of information. We therefore all have a responsibility to educate ourselves on how best to protect the information we store electronically. CU has specific requirements intended to ensure adequate protection of information we store from potential risks such as loss or modification. It is your responsibility to be aware of and understand these policies and procedures.
In an effort to better secure sensitive data at CU, the IT Security Office has compiled this quick reference guide for private data. This type of data should not be stored on workstations or mobile computing devices (laptops, PDAs, flash drives, etc) unless a strong business need exists and proper security precautions have been taken.
Private data and some common occurrences:
Important practices to keep in mind when dealing with private data include:
Content by CU-Boulder
