  {"id":16042,"date":"2026-01-27T10:52:00","date_gmt":"2026-01-27T16:52:00","guid":{"rendered":"https:\/\/uwm.edu\/information-technology\/?p=16042"},"modified":"2026-01-27T10:52:02","modified_gmt":"2026-01-27T16:52:02","slug":"what-is-data-privacy","status":"publish","type":"post","link":"https:\/\/uwm.edu\/information-technology\/what-is-data-privacy\/","title":{"rendered":"What is Data Privacy?"},"content":{"rendered":"\n<p>Data privacy refers to the protection of your personal\u00a0data. Your personal data is any information that is identifiable to you, such as your name, date\u00a0of birth,\u00a0social security number, financial information,\u00a0etc.\u00a0\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-keeping-your-data-safe\">Keeping Your Data Safe<\/h2>\n\n\n\n<p>The best way to keep your data safe is to understand how your personal data can be shared and\u00a0implement\u00a0best practices into your daily routine online. Here are a few security tips to keep in mind:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Be Aware of Phishing<\/strong>: Always be skeptical of unexpected emails, especially those asking you to do something. Do not click links or open attachments or reply with personal information. If you are concerned about an email, please contact the 51ÁÔÆæ Help Desk. For more information on how to spot a phishing email, please visit the\u00a0<a href=\"https:\/\/uwm.edu\/information-technology\/cybersecurity\/phishing\/\">phishing webpage<\/a>.\u00a0<\/li>\n\n\n\n<li><strong>Enable Multi-Factor Authentication (MFA)<\/strong>: Multi-factor authentication adds an extra layer of protection by combining something you know (your password) with something you have (like a mobile device). Visit the <a href=\"https:\/\/uwm.edu\/information-technology\/digital-id\/#h-multi-factor-authentication\">digital identity webpage<\/a> to learn more about how MFA is used at 51ÁÔÆæ. Be sure\u00a0that MFA is\u00a0enabled\u00a0on\u00a0your personal\u00a0accounts\u00a0as well.\u00a0The National Cybersecurity Alliance offers more information on\u00a0<a href=\"https:\/\/www.staysafeonline.org\/articles\/multi-factor-authentication?_gl=1*1weu0lz*_gcl_au*MjA3MDE4MTQ4LjE3NjgyMjk1ODE.\">what\u00a0MFA is and why it is important<\/a>.\u00a0<\/li>\n\n\n\n<li> <strong>Use\u00a0Passphrases<\/strong>:\u00a0By using longer, more complex phrases instead of single words, you significantly increase the time it would take for an attacker to crack your password.\u00a0Start with three\u00a0randoms\u00a0words, mix uppercase and lowercase and add in numbers and symbols.\u00a0Create\u00a0separate\u00a0passphrases for each account you own.\u00a0\u00a0<\/li>\n\n\n\n<li><strong>Install Antivirus Software<\/strong>:\u00a0Installing, updating, and regularly running antivirus software\u00a0will\u00a0protect your\u00a0personal\u00a0devices against virtual threats. Please visit the\u00a0<a href=\"https:\/\/uwm.edu\/information-technology\/cybersecurity\/data-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">data\u00a0security webpage<\/a>\u00a0for 51ÁÔÆæ\u00a0IT\u2019s\u00a0antivirus recommendations\u00a0for personal devices.<\/li>\n<\/ul>\n\n\n\n<p>51ÁÔÆæ\u00a0IT\u2019s\u00a0<a href=\"https:\/\/uwm.edu\/information-technology\/cybersecurity\/\">cybersecurity webpage<\/a>\u00a0has\u00a0more information on these\u00a0key\u00a0topics. If you have any questions about data privacy, please contact the\u00a0<a href=\"https:\/\/uwm.edu\/information-technology\/help\/\">51ÁÔÆæ Help Desk<\/a>.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data privacy refers to the protection of your personal\u00a0data. Your personal data is any information that is identifiable to you, such as your name, date\u00a0of birth,\u00a0social security number, financial information,\u00a0etc.\u00a0\u00a0 Keeping Your Data Safe The best way to keep your &hellip;<\/p>\n","protected":false},"author":13719,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","uwm_wg_additional_authors":[]},"categories":[8],"tags":[],"class_list":["post-16042","post","type-post","status-publish","format-standard","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Technology Resources<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/information-technology\/what-is-data-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Data Privacy?\" \/>\n<meta property=\"og:description\" content=\"Data privacy refers to the protection of your personal\u00a0data. Your personal data is any information that is identifiable to you, such as your name, date\u00a0of birth,\u00a0social security number, financial information,\u00a0etc.\u00a0\u00a0 Keeping Your Data Safe The best way to keep your &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/information-technology\/what-is-data-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology Resources\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-27T16:52:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-27T16:52:02+00:00\" \/>\n<meta name=\"author\" content=\"Amanda R Brickner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@51ÁÔÆæ_IT\" \/>\n<meta name=\"twitter:site\" content=\"@51ÁÔÆæ_IT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amanda R Brickner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/what-is-data-privacy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/what-is-data-privacy\\\/\"},\"author\":{\"name\":\"Amanda R Brickner\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#\\\/schema\\\/person\\\/9b3157bbbbefcf45625810581c9a4bcb\"},\"headline\":\"What is Data Privacy?\",\"datePublished\":\"2026-01-27T16:52:00+00:00\",\"dateModified\":\"2026-01-27T16:52:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/what-is-data-privacy\\\/\"},\"wordCount\":315,\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/what-is-data-privacy\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/what-is-data-privacy\\\/\",\"name\":\"What is Data Privacy? - Technology Resources\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\"},\"datePublished\":\"2026-01-27T16:52:00+00:00\",\"dateModified\":\"2026-01-27T16:52:02+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#\\\/schema\\\/person\\\/9b3157bbbbefcf45625810581c9a4bcb\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/what-is-data-privacy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/what-is-data-privacy\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/what-is-data-privacy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Data Privacy?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\",\"name\":\"Technology Resources\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#\\\/schema\\\/person\\\/9b3157bbbbefcf45625810581c9a4bcb\",\"name\":\"Amanda R Brickner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7cadce68f31dfcc11d73732eca5d58148e867a315b2252c9404f4768f2274054?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7cadce68f31dfcc11d73732eca5d58148e867a315b2252c9404f4768f2274054?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7cadce68f31dfcc11d73732eca5d58148e867a315b2252c9404f4768f2274054?s=96&d=mm&r=g\",\"caption\":\"Amanda R Brickner\"},\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/author\\\/amandabuwm-edu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Technology Resources","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/information-technology\/what-is-data-privacy\/","og_locale":"en_US","og_type":"article","og_title":"What is Data Privacy?","og_description":"Data privacy refers to the protection of your personal\u00a0data. Your personal data is any information that is identifiable to you, such as your name, date\u00a0of birth,\u00a0social security number, financial information,\u00a0etc.\u00a0\u00a0 Keeping Your Data Safe The best way to keep your &hellip;","og_url":"https:\/\/uwm.edu\/information-technology\/what-is-data-privacy\/","og_site_name":"Technology Resources","article_published_time":"2026-01-27T16:52:00+00:00","article_modified_time":"2026-01-27T16:52:02+00:00","author":"Amanda R Brickner","twitter_card":"summary_large_image","twitter_creator":"@51ÁÔÆæ_IT","twitter_site":"@51ÁÔÆæ_IT","twitter_misc":{"Written by":"Amanda R Brickner","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uwm.edu\/information-technology\/what-is-data-privacy\/#article","isPartOf":{"@id":"https:\/\/uwm.edu\/information-technology\/what-is-data-privacy\/"},"author":{"name":"Amanda R Brickner","@id":"https:\/\/uwm.edu\/information-technology\/#\/schema\/person\/9b3157bbbbefcf45625810581c9a4bcb"},"headline":"What is Data Privacy?","datePublished":"2026-01-27T16:52:00+00:00","dateModified":"2026-01-27T16:52:02+00:00","mainEntityOfPage":{"@id":"https:\/\/uwm.edu\/information-technology\/what-is-data-privacy\/"},"wordCount":315,"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/uwm.edu\/information-technology\/what-is-data-privacy\/","url":"https:\/\/uwm.edu\/information-technology\/what-is-data-privacy\/","name":"What is Data Privacy? - Technology Resources","isPartOf":{"@id":"https:\/\/uwm.edu\/information-technology\/#website"},"datePublished":"2026-01-27T16:52:00+00:00","dateModified":"2026-01-27T16:52:02+00:00","author":{"@id":"https:\/\/uwm.edu\/information-technology\/#\/schema\/person\/9b3157bbbbefcf45625810581c9a4bcb"},"breadcrumb":{"@id":"https:\/\/uwm.edu\/information-technology\/what-is-data-privacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/information-technology\/what-is-data-privacy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/information-technology\/what-is-data-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/information-technology\/"},{"@type":"ListItem","position":2,"name":"What is Data Privacy?"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/information-technology\/#website","url":"https:\/\/uwm.edu\/information-technology\/","name":"Technology Resources","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/information-technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/uwm.edu\/information-technology\/#\/schema\/person\/9b3157bbbbefcf45625810581c9a4bcb","name":"Amanda R Brickner","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7cadce68f31dfcc11d73732eca5d58148e867a315b2252c9404f4768f2274054?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7cadce68f31dfcc11d73732eca5d58148e867a315b2252c9404f4768f2274054?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7cadce68f31dfcc11d73732eca5d58148e867a315b2252c9404f4768f2274054?s=96&d=mm&r=g","caption":"Amanda R Brickner"},"url":"https:\/\/uwm.edu\/information-technology\/author\/amandabuwm-edu\/"}]}},"acf":[],"meta_fields":{"_edit_lock":["1769532725:13719"],"_edit_last":["13719"],"feat_img_video":[""],"feat_img_gallery":[""],"feat_img_caption":["feat-img-caption-on"],"breadcrumbs_display":["breadcrumbs-on"],"otp_nav_display":["otp-on-mobile"],"post_layout":["post-layout-theme"],"_yoast_wpseo_primary_category":["8"],"_yoast_wpseo_content_score":["90"],"_yoast_wpseo_inclusive_language_score":["90"],"_yoast_wpseo_focuskeywords":[""],"_yoast_wpseo_keywordsynonyms":[""],"_yoast_wpseo_estimated-reading-time-minutes":["2"],"_yoast_indexnow_last_ping":["1769532723"],"_uwm_wg_content_review_log":["a:1:{i:0;a:5:{s:11:\"reviewer_id\";i:0;s:6:\"status\";s:5:\"reset\";s:10:\"entry_date\";s:19:\"2026-03-01 02:13:53\";s:16:\"priority_content\";s:0:\"\";s:4:\"note\";s:43:\"Content review reset at start of new cycle.\";}}"]},"publishpress_future_action":{"enabled":false,"date":"2026-04-24 21:46:25","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts\/16042","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/users\/13719"}],"replies":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=16042"}],"version-history":[{"count":1,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts\/16042\/revisions"}],"predecessor-version":[{"id":16043,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts\/16042\/revisions\/16043"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=16042"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/categories?post=16042"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/tags?post=16042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}