Privacy Blog

  • Etiquette Tips for Wearable Technologies

    IW_Google Glass

    In today’s techno-saturated society, where devices are equipped with high quality cameras and microphones that can instantly share to the entire population of the Internet, we need to consider what is appropriate when using wearable technology. Wearable technology (also called wearable gadgets) is a category of technology devices that can be worn by a consumer and often include tracking information related to health and fitness.

    Read the rest

  • Apple’s Fingerprint ID may mean you can’t ‘Take the Fifth’

    Planning on purchasing a new iPhone 5s? Perhaps think twice about enabling the new fingerprint authentication offered by the device and iOS 7. And this time, it's not the hackers you should keep a lookout for.

    From Wired magazine:

    "There’s a lot of talk around biometric authentication since Apple introduced its newest iPhone, which will let users unlock their device with a fingerprint. Given Apple’s industry-leading position, it’s probably not a far stretch to expect this kind of authentication to take off. Some even argue that Apple’s move is a death knell for authenticators based on what a user knows (like passwords and PIN numbers).

    Read the rest

    Learn more about protecting:
  • Announcing Domain 12: Compliance - Information Security & Privacy Program

    We are pleased to announce Domain 12: Compliance, of our IU Information Security and Privacy Program.

    Since the program is vast, like an encyclopedia, and can be difficult to digest at once, our "12 Domains in 12 Months" campaign encouraged the review of one domain per month -- in hopes to make it easier to study each domain's resources and gauge your local efforts towards meeting the objectives.

    Read the rest

  • How do I know he is who he says he is?

    Do you sometimes need to verify that a person is who they say they are, prior to giving them information or access? Have you struggled with ways to do that? Now all the advice we could collect has been put together into one document on Identity Verification.

    You'll find a description of different levels of identity verification so you can determine how hard you should work to verify an identity.

    Information about these different types of verification is included:

    Read the rest

  • Free Digital Citizenship Book Download!

    In honor of Data Privacy Day 2013, Intel and Reed Elsevier are making the best-selling digital citizenship book, lol...OMG! available absolutely FREE (reg. $19.95) Jan 25 - 29, 2013.

    Read the rest

  • Privacy Awareness Videos Now Available

    Indiana University now has a number of short videos available for increasing the privacy awareness and expertise of our community.

    Read the rest

  • Posters for Promoting Privacy

    You, too, can help promote privacy awareness during Data Privacy Month! Consider downloading, printing, and distributing these free posters. They are good examples of simple and attractive awareness material that helps promote privacy-aware (and secure) information handling practices.

    Please feel free to print them out and post them in prominent locations, distribute them in mailboxes, or use in other creative ways!

    Read the rest

  • January is Data Privacy Month!

    It's a new year - a perfect time to make some resolutions to better protect your privacy, and that of those whose personal information you collect, store, and use at work. January is Data Privacy Month, with January 28 being celebrated around the world as International Data Privacy Day!

    Here are some ways to refresh your knowledge about privacy-aware business and consumer practices this month:

    Read the rest

  • Information Systems Acquisition, Development, and Maintenance - Domain 9 of the Information Security & Privacy Program

    To celebrate the endorsement of the new IU Information Security and Privacy Program and to raise awareness of the Program, we are continuing a "12 Domains in 12 Months" awareness campaign. This month, we encourage you to study Domain 9: Information Systems Acquisition, Development, and Maintenance.

    Our video for this domain features Jim Thomas, Director, Enterprise Business Systems in UITS.

    Read the rest

    Learn more about protecting: