Search related to privacy

Showing 1 - 10 of 14 results
November 2, 2018

Do's and Don'ts

November 2, 2018

Congratulations! You’re embarking on a research project. Your plate will be full; lots of ideas and tasks. 

While you think you may not have time to attend a long list of rules and requirements, we encourage you to pay attention to these Do’s and Don’ts of protecting your data. 

x  Store data on personal devices

April 30, 2018

May 1,2018

Facebook is one of the most famous social media sites in today’s modern world. Started by Mark Zuckerberg with his fellow roommates in 2004 to allow students at Harvard University to connect with each other, Facebook gained immense popularity in a short span of time and is now used by 2.2 billion people worldwide. It has also played a vital role in transforming the world into a global village.

December 6, 2017

December 6, 2017

Office 365 is a widely adopted collaboration and content management platform that is often extended using third-party software. Many companies offer "free" tools, services, plug-ins, or widgets that provide extra features and functionality within Office 365. Use of these tools generally requires registration on the site and acceptance of companies' terms of use. Some examples of third party add-ons include Boomerang and Trello.

November 8, 2017

November 10, 2017

June 2, 2017

June 9, 2017

Stop and think for a minute about how much information about you is online right now: Do you have a Facebook page? What about LinkedIn? Did you post any tweets today, or retweet someone else's message? Have you been part of an event where there are pictures of you or does your name appear in a participant list? Written any blogs or responded with comments to news articles? Filled out any online petitions? 

March 13, 2017


March 13, 2017

One question that the InfoSec team gets quite frequently is, how do I encrypt a file to send via email?  Well I'm glad you asked!

March 2, 2017

Aegis SecureKey 3.0

March 2, 2017


USB drives are extremely useful devices for transferring data between computers and users. However, that convenience comes with a large amount of risk and placing University data on an unencrypted USB drive can have significant consequences if that device is lost or stolen.  Those consequences could include financial, business, or reputational impact to the University.

January 3, 2017

Respecting Privacy, Safeguarding Data, Enabling Trust - Data Privacy Day January 28th

January 3, 2017

You exist in digital form all over the Internet. It is thus important to ensure that the digital you matches what you are intending to share. It is also critical to guard your privacy — not only to avoid embarrassment, but also to protect your identity and finances!

December 22, 2016

January 10, 2017

"Want to know your Star Wars character name?  Your Professional Wrestling Name?  Your My Little Pony name?  Just take your birth month, or the street name of the first house you lived in, the city you were born in, your mother’s maiden name, name of your childhood best friend, first name of your spouse’s father and post them below."