Hackers can access your personal information in many ways. Fortunately, there are tools available to shield the data that you share, access, or create online. Learn about how to create strong passwords, security tools that protect your private information, the perils of public Wi-Fi, how to shop safely online, as well as how to protect your personal devices from getting hacked.

What is Privacy?

computer and cell phone with security crest

  • Privacy is the right to be let alone, to be free from interference and intrusion.
  • Privacy starts with an assessment of what, who, where, and why?
  • What information is being collected, used, shared or maintained? What platform is being used to collect, store, share or maintain information?
  • Whose information is being collected, used, shared or maintained?
  • Where is the geographic location of the person and information?
  • Why are we collecting, using, sharing personal information?

Common Areas of Privacy

Bodily Privacy: is the protection of a person’s physical being. Examples may include genetic or drug testing.

Communications Privacy: is the security and privacy of postal or email, telephone or other forms of communication.

Information Privacy: is the protection of personal data. Examples may include credit card information, health or student information. (This is also known as data protection.)

Territorial Privacy: is the setting of limits on intrusion into the domestic or other  environments. For example, workplace or public space.

FAQs

Questions?

Contact us at privacy@nyu.edu