Data Protection Notes

Role of the Data-Literate Individual in Protecting Personal Data

  • You are the greatest line of defense when protecting your personal data. As someone who is data literate, you can take responsibility for the data you create as well as how it's collected. This lesson focuses on providing tips for protecting your data and identifying ways it can be stolen or compromised. There are two primary types of data loss, data breach and data leak. Data leaks are triggered by user or human errors or lack data security habits and practices.

Data Loss Types: Data Breach

  • Definition: \text{Data Breach} = \text{Targeted external attack by a third party to steal specific sensitive information by identifying weaknesses in a data security system}
  • Description: A targeted external attack where a malicious actor attempts to exploit vulnerabilities in a data security system to access specific sensitive information.
  • Real-world impact: These types of attacks have caused many companies and universities to lose billions of dollars or shut down entirely for a period while the breach is investigated, possibly resulting in exposure or loss of hundreds of thousands of student records.
  • Relationship to outcome: Both data breach and data leak end with the same result: data exposure or loss.

Data Loss Types: Data Leak

  • Definition: \text{Data Leak} = \text{Triggered by user or human errors or lack data security habits and practices}
  • Causes and examples: While considered to be vulnerable to external threats, data leaks include social engineering, spyware, and malware. These are external attacks, but they are only successful when students are not maintaining an awareness of data security practices, which also makes them a type of data leak.
  • Prevention and protection: Data leaks are preventable by ensuring students are cybersecurity aware and learn to maintain good security practices. These practices protect not only their personal data outside of school, but also data within the university network.

Prevention Strategy: Awareness and Habits

  • Step 1: Awareness — By learning more about the risks and the types of attacks, you are already taking a big step toward protecting yourself and your data.
  • Step 2: Action — Start using the right tools and building habits to prevent and reduce exposure. The lesson indicates to click next slide to learn ways to take action and protect your data.

Real-World Context and Implications

  • Economic and operational impact: Attacks have caused billions of dollars in losses and can force organizational shutdowns during investigations.
  • Data scope: The exposure or loss can involve hundreds of thousands of student records.

Ethical, Philosophical, and Practical Implications

  • Responsibility and stewardship: You are responsible for your own data and its collection.
  • Privacy and trust: Protecting data supports ethical handling of information and maintains trust in institutions.
  • Practical takeaways: Awareness is the first step; use tools and develop security habits to minimize risk.

Action Steps and Next Steps

  • Final note: The next slide will outline concrete actions you can take to protect your data.