Your personal information is like money—value and protect it

As users and consumers of a worldwide internet, each of us has a role to play in protecting our private information. Data privacy is about your freedom—who has access to your personal activities, information, and ideas? Much of our day-to-day activity and work takes place on the internet or on an internet-capable device, but how often do we pause to consider who has access to our information, and how they are using this information?

These concepts are the theme of Data Privacy Day, an internationally recognized day on Jan. 28 that encourages every global citizen to learn how to better protect private information in a world that is increasingly connected. Here are some excellent resources about how to take back your privacy and keep your information safe:

  • Cookies and your behavior: It’s no secret that organizations use your browsing habits to offer specific products or modify prices—learn how to control what these organizations know about you.
  • Mobile devices: These convenient devices are also convenient for data thieves. Fortunately, there are ways to reduce the risk to your information when you access the internet or download an app.
  • Online shopping & banking: An ever-increasing number of websites are accepting credit card information and allowing you to view or change financial information. Two-factor authentication can offer additional protection.
  • Tax season: It’s a good time to think about how our financial information stays secure, whether online or on paper. Check out this ITS blog post for information about how to avoid becoming a victim of tax fraud, and how to recover quickly if it happens to you.

ITS is coordinating the third annual Drake shred event this spring! Bring your confidential documents and have them shredded free of charge on Thursday, April 20, from 12 to 3 p.m. Look for more information in a future OnCampus issue.

Learn even more about how to secure your digital life by visiting our blog at its.drake.edu/category/security-blog/.

—Peter Lundstedt, Information Security Manager