Each of us is responsible for protecting the private personal information collected and stored by the University for business purposes, as well as our own. A person’s name alone is not useful to a criminal, but when combined with other information, an identity can be stolen and exploited.
Private Personal Information and Three Ways to Protect It
Security and Access Within U-M's Computing Environment
U-M is committed to maintaining a secure IT environment for teaching, learning, research and administrative activities, and at the same time, providing an open infrastructure to support the University’s mission. Web access to the vast data resources in U-M's institutional systems increases our efficiency; it also increases the risk that personal information can be compromised inadvertently, misused intentionally, or even stolen.
Individual behavior matters, and you can make a difference. Protect the private personal information that is entrusted to us and follow safe computing practices when accessing centralized systems, such as Wolverine Access and departmental files, that contain private personal information.
How You Can Protect ID
You can reduce the risks and increase security with remarkably little effort. Take these first steps toward protecting private personal information:
For more information, read the University Record article, "U-M focuses on protecting private personal info" (May 22, 2006).
January 17, 2013