Why Should You Report Security Incidents? And How Do You Report One?
Photo and Video Privacy Issues
The Password is Dead, Long Live the Password!
Data Privacy Month: NSA Surveillance Panel at the National Constitution Center
Protecting Your Finances During This Year’s Holiday Shopping Season
Beware of Phishing E-mails in the Wake of Typhoon Haiyan
No E-mail from Penn Will Ask For Your Username/Password or SSN
The Children's Online Privacy Protection Act: Does It Apply to Your Website?
October: National Cyber Security Awareness Month; Free Secure Disposal of Paper and Electronics
What Basic Rules Protect Student Information at Penn? (September 2013)
Protecting Privacy and Security on Penn + Box
Security Starts With You
New Regulatory Changes: Do They Apply to Your Area?
Protecting Yourself from Rogue AntiVirus Warning Scams
Security and Privacy Tips for World Travelers
Tuesday, August 27, 2013 - Almanac Vol. 60, No. 2
Security Starts With You
By now, most of us are familiar with news stories about lost or stolen computers and cell phones, individuals being tricked by hackers into providing their passwords or opening malicious files, or the spread of sensitive or proprietary company information onto personal devices. These examples have something important in common. They highlight the central role each of us plays in helping to ensure the security of devices and data.
Here are three tips for effective security and privacy protections:
- First and foremost, know where to get help. At Penn every member of our faculty, staff and student body has a designated Local Support Provider (LSP). Your LSP will know the most about your specific needs and environment, and is therefore the best person to talk to first with any IT questions—including those related to data security or privacy. Look here to find your LSP: https://secure.www.upenn.edu/computing/resources/content/get-it-help
- Know the data you work with and any special rules that apply. Law and Penn policy may, for example, require special security protections and limits on sharing. Special rules may apply depending on the sensitivity and type of data you are working with, such as HIPAA-protected health information, FERPA-protected student data, Social Security numbers, alumni data, email and other electronic files, applicant data and more. For information on such requirements, visit http://www.upenn.edu/privacy. For questions, contact the Privacy Office at firstname.lastname@example.org
- Take advantage of free tools and published best practices. ISC's Office of Information Security makes available a number of resources to help you secure your systems and data, including free anti-virus software for your work and personal computers, Penn+Box for collaboration and file storage, and "Top 10" tips for securing computers and mobile devices (see www.upenn.edu/computing/security/checklists/Top10/). For assistance with these resources (and many more) contact email@example.com