Private Information Decision Tree

The E. Philip Saunders College of Business provided the Decision Tree below. This should help you determine what to do with information the Identity Finder scan reports.

Click to enlarge.

IDF Decision Tree

Private Information Handling Quick Reference Table

Private Information Handling Quick Reference Table

Updated 8/14/12

This table provides recommendations on the correct handling of private information at RIT.

New York State defines private information (PI) as any personal information concerning a natural person combined with one or more of the following data elements: Social Security number, driver's license number, account number, or credit or debit card number in combination with any required security code.

Digital Self Defense 103 - Information Handling fulfills the training requirement for handling RIT Private or Confidential Information.

Consult the Identity Finder End User Guide for Windows or Mac for more information.

... ...

Private Information Management Initiative (PIMI) FAQ

Updated 2/25/2015.

Jump to:







What is the Private Information Management Initiative?

The Private Information Management Initiative (PIMI) is a program where the RIT Information Security Office helps RIT faculty and staff scan their computers and attached drives to determine if they contain private information (PI). When PI is found, each RIT faculty and staff member is responsible for remediating the private information by scrubbing or shredding the files.

The program also includes destruction of paper files containing nonessential PI.

The goals of the program are to identify and reduce the amount of private information at RIT. This... ...

Safe Social Networking and Blogging

Social networks are great. They do present some security challenges and risks, however.

This guide describes the dangers you face as a user of these websites, and provides tips on the safe use of social networking and blogging services.

Dangers of Social Networking

Many computer criminals uses these sites to distribute viruses and malware, to find private information people have posted publicly, and to find targets for phishing/social engineering schemes. Below is a short list of users who may be using the same sites as... ...

Identity Theft

Scams and malware are not the only way criminals can steal identities. There are many ways for identity thieves to victimize you, damage your credit, steal important documents or information.

Read our Avoiding Identity Theft Online brochure to learn how to spot basic online scams and how to protect yourself.

Although online scams and malware have reached epidemic proportions, they are not the only way criminals can steal identities. Discarded bank statements, receipts, bills, etc. are also great sources for identity thieves. The Federal Trade Commission's Identity Theft page provides more information on the different methods... ...