- Get help
- Announcements & alerts
- Service outages
- Security alerts
- Major initiatives
- Information security
- Anti-Spam (CASL) Compliance
- Data security standard
- Desktop Security
- Identity Protection
- Phishing Scams
- Remote work
- Security hygiene
- Tips for safe computing
- Travelling with technology
- Keeping Your Personal Information Safe During the Holidays
Vision, strategy and policy
- One I.S. vision
- Cloud Computing Strategy
- Stewardship Model
- Stewardship Committees
- Stewardship Workflow
- Connecting to University Governance
- Approval and Prioritization
- Stewardship and Project Management
- Terms of Reference: One I.S. Stewardship Committee
- Administrative Systems Stewardship Committee
- Terms of Reference: Research Systems Stewardship Committee
- Terms of Reference: Educational Systems Stewardship Committee
- Mobile Strategy
- Reports and blog
- Vision, strategy and policy
Your identity is comprised of several individual pieces of information such as your phone number, address, employee number, PINs, credit card numbers, bank account number, driver’s license, passport, student number, ID badges, email and other accounts and credentials.
What is identity fraud?
Identity fraud is the act of stealing enough of your identity information to commit fraud, purchase goods and services, or to commit other crimes in your name. A thief could apply for loans and credit cards, send and receive mail on your behalf, travel as you, change your address, sell your property, or implicate you in criminal activities.
Identity theft can take months, and sometimes years to detect, and it can take just as long to correct the damage it causes. Thieves can store stolen identities for years before selling or using them. As a result, victims often do not know when their identity was compromised.
How do identity thieves obtain your personal information?
Skilled thieves will use a variety of methods. They will
- Steal of your personal property such as your wallet, purses, and mail.
- Rummage through your garbage at home or at work.
- Gather information you have posted on the Internet.
- Obtain your financial information by masquerading as an authority figure.
- Watch over your shoulder while you enter your passwords or PINs.
- Trick you into giving information through well-crafted emails or websites.
- Hack into your computer at home or work to harvest your usernames, passwords, contacts as well as any other useful information you have handy.
How do you protect your identity?
- Use anti-malware software.
- Maintain your computer security.
- Keep your computer patches up-to-date.
Learn more about protecting your computer on the Desktop Security page.
How is SFU protecting your information?
Please read the University's policies.