Skip to main content
Texas A&M University
Technology Services
  • Services
    • IT Services A-Z
    • IT Services Directory
  • Leadership
    • Office of the CIO
      • Chief Information Officer
      • Associate Vice President for Enterprise IT Operations
      • AVP Enterprise Application Services
      • Chief Technology Officer
      • AVP Enterprise Networks
      • AVP for IT Architecture and Design
      • Assistant Vice President of Product Management
      • Assistant Vice President of Research IT
      • Assistant Vice President of Strategic Partnerships & Alliances
      • Assistant Vice President for IT Academic Operations
      • Assistant Chief Information Officer of Operations
      • Chief of Staff
      • Director of IT Finance
      • Director of Statewide Client Services
    • IT Governance
      • Purpose
        • IT Governance Definitions
      • Committees
        • Special Groups
        • Archived Committees
        • EITC
        • CSCC
        • SPC
          • Audiovisual Surveillance Technology Operational Group
          • IT Policy Review Operational Group
        • ESC
        • RTC
        • SATC
      • Calendar
      • IT Strategy
    • Strategic Initiatives
      • Priority Projects
        • 1. Ticketing System Selection
        • 2. Next Generation Aggie Network
        • 3. Cisco VoIP Phone Service Upgrade
      • Completed Projects
        • Aggie Innovation Platform
        • Microsoft (Office) 365 Implementation
        • New West Campus Data Center
        • Legacy Network Decommission
        • 802.11ac Campus Upgrade
        • Secure Technologies for Aggie Researchers (STAR)
        • NetID Two-Factor Authentication (Duo)
        • University-Wide IT Governance Framework Implementation
        • Campus Firewall Replacement
        • Data Center Resource Migration Plan
        • Self Service Site Strategic Redesign
        • Key Performance Indicators (KPIs)
        • Service Desk Renovation
        • SPECTRIM/Archer Implementation
        • University-Wide Information Technology Governance Framework Development
    • About Technology Services
      • Contact Us
    • Reports & Publications
    • News
  • Security
    • Safe Computing
      • Protect Your Device
        • Protecting Desktops & Laptops
        • Protecting Mobile Devices
        • Stay Secure on Public Wi-Fi
      • Protect Your Identity (current)
        • Protect Myself Top 5
        • Identity Theft
        • Spam
        • Safe Social Networking
        • File Sharing
        • Phishing Emails (& Internet Scams)
      • Protect University Data
        • Protect My Work Top 5
        • Protecting Confidential Information
        • Discovery and Open Records
        • Protecting the Workplace
        • International Travel
    • Cybersecurity Games
    • CAP
      • CAP Application
    • For IT Professionals
      • Best Practices
      • Compromised System Response
      • Incident Response Plan
  • Policy
    • IT Accessibility
    • Frequently Asked Questions
    • Policy Glossary
    • IT Policy
      • Controls Catalog
        • Controls Review Process
        • Controls Posted for Review
      • Exception Requests
      • Laws and Regulations
        • HIPAA
        • CUI
        • DMCA
      • Local Policy
        • Project Management
        • AV Surveillance
          • AVST Operational Standards
        • TAMU Network Use
          • Acceptable Use
          • Anonymous Proxy Servers
          • Guest Wireless Terms of Use
          • Traffic Engineering
          • NAT Devices
        • Cloud Computing at Texas A&M
    • IT Risk Management
      • Risk Assessment Procedures
        • IT Managed Checklist
        • Non-IT Pro Assessment Checklist
        • Dean/VP Approval Process
        • Reporting & Review
      • Risk Assessment Roles
        • CIO
        • CISO
        • Division Risk Assessment Coordinator
        • Non-IT Professional
      • Risk Remediation
    • IT Continuity of Operations
      • IT Disaster Recovery
        • Unit Level IT DR Planning
    • E-Discovery
      • Overview
      • IT Preservation Holds
        • Preservation Hold Process
      • Public Information Request
  • Community
    • Communities of Practice
    • Collaboration
    • IT Communication
      • Campus IT Contacts
      • IT Communication Channels
      • IT Websites
      • Change Management
    • IT Events
    • Tools
      • IT Standards
      • Data Classification + Research Resources
      • Impact Calculator
  • Help
  • Safe Computing
  • Cybersecurity Games
  • CAP
  • For IT Professionals
Safe Computing
  • IT Home
  • Security
  • Safe Computing
  • Protect Your Identity

Protect Your Identity

Each day brings news of data breaches and personal information losses by companies across the world. How do you protect your data? Follow these guides and learn how to guard your personal identity.

  • Protect my Identity Top 5
  • Identity Theft
  • Phishing (& Internet Scams)
  • Spam
  • Safe Social Networking
  • File Sharing
Services
  • IT Services A-Z
  • IT Services Directory
Leadership
  • Office of the CIO
  • IT Governance
  • Strategic Initiatives
  • About Technology Services
  • Reports & Publications
  • News
Security
  • Safe Computing Guides
  • Cybersecurity Games
  • CAP
  • IT Professionals
Policy
  • IT Policy
  • IT Risk Management
  • IT Continuity of Operations
  • E-Discovery
  • IT Accessibility
Community
  • IT Events
  • IT Communication
  • Collaboration
  • Careers at Technology Services
Help
  • View IT Service Alerts
  • Get Tech Help
  • Search the Knowledge Base
  • New Student Tech Guide
Stay Connected

Give us your feedback, make suggestions, and ask questions.

Contact Us

  • Like us on Facebook
  • Follow us on Twitter
  • Follow us on Instagram
Services
  • IT Services A-Z
  • IT Services Directory
Leadership
  • Office of the CIO
  • IT Governance
  • Strategic Initiatives
  • About Technology Services
  • Reports & Publications
  • News
Security
  • Safe Computing Guides
  • Cybersecurity Games
  • CAP
  • IT Professionals
Policy
  • IT Policy
  • IT Risk Management
  • IT Continuity of Operations
  • E-Discovery
  • IT Accessibility
Community
  • IT Events
  • IT Communication
  • Collaboration
  • Careers at Technology Services
Help
  • View IT Service Alerts
  • Get Tech Help
  • Search the Knowledge Base
  • New Student Tech Guide
Stay Connected

Give us your feedback, make suggestions, and ask questions.

Contact Us

  • Like us on Facebook
  • Follow us on Twitter
  • Follow us on Instagram
Texas A&M University
  • Technology Services
  • Site Map
  • Site Policies
  • Accessibility
Back to Top