Author: Will Schuett

Take Ownership of Your Privacy

Learn more at

Social media and mobile apps allow people to stay connected with friends and family, organize their work and personal lives, learn new things, explore new interests or activities, make travel plans, play games, or binge-watch the latest shows. However, these technologies also introduce a plethora of ways for personal information to be tracked, shared, or exposed. Here are some tips you can follow to protect your online information and keep your personal information private.

  • Limit the amount of personal information that you share online by updating your privacy settings on websites, apps, and mobile devices at least one or two times per year. Not sure where to begin? The National Cyber Security Alliance (NCSA) website provides direct links to update individual account privacy settings on popular devices and online services.
  • Working in a public space? People can easily overhear phone conversations, so make sure you move to a private area when discussing personal or confidential information. People can also unintentionally—or intentionally—see what’s on your laptop or mobile device. Consider investing in a privacy screen to prevent shoulder surfing and to help protect sensitive work information or details about your personal life.
  • Turn on two-step verification or multifactor authentication (MFA) whenever it’s offered to help prevent unauthorized access to your mobile devices or online accounts. The National Institute of Standards and Technology (NIST) provides more details about MFA and why it’s important. The Two Factor Auth (2FA) website provides a list of websites that support 2FA.
  • Use a virtual private network (VPN) while working from home or using public Wi-Fi networks, especially when using a banking app or conducting other important personal or professional business. VPNs create a secure, encrypted connection (like a tunnel) between your device and the network. You can also use incognito or private web browsing windows to limit the information collected in your browsing history, cookies, or online forms.
  • Don’t overshare! Limit the kinds of personal information you share on social networking sites. And before you post those vacation pictures, remember that the same data used to help sort and store your photos by date and location can also (unintentionally) reveal where you live, work, or vacation.1
  • Online quizzes and games can be fun, but before taking that quiz to find out which Hogwarts house you belong in, think about how the personal details from your social media profiles might be sold to or shared with data collection companies.2 (Look for a privacy policy whenever you play a game or take a quiz to see how social media or affiliate sites may capture and use your personal data.)
  • Learn more about why privacy matters. It’s important to understand the different aspects of privacy (e.g., personal privacy, autonomy, secrecy, limited access, and the “right to be let alone”), as well as how the two distinct concepts of privacy and security differ.3


  1. Thomas Germain, “How a Photo’s Hidden ‘Exif’ Data Exposes Your Personal Information,” Consumer Reports (website), December 6, 2019. 
  2. “Scam Alert: That Facebook Quiz Might Be a Big Data Company Mining Your Personal Information,” Better Business Bureau (website), March 21, 2018. 
  3. Valerie Vogel and Joanna Grama, “The Yin and Yang of Security and Privacy,” EDUCAUSE Review, January 28, 2019. 

For more information about information security governance, compliance, data protection, and privacy programs, please visit the EDUCAUSE Review Security Matters blog as well as the Cybersecurity Program page. Access additional security and privacy awareness resources through the Awareness Campaigns page.

New IT Service Catalog

We’re excited to introduce our new Service Catalog, which organizes IT services in one location for you to find and request IT help. The new Service Catalog is an extension of our new system for tracking and resolving your requests and is available alongside our existing Knowledge Base.

In the Service Catalog, you can perform keyword searches and “favorite” frequent request forms. After submitting a request, you can communicate with an IT staff member and see your request’s status updates. It will also suggest related Knowledge Base articles if a self-help option is available while you search for a service.

As we transition to our new system, be aware of the following changes:

Active service requests will still be in the old system

As we transition to the new request system, any current, open requests you have will still be visible and active in the old system.  If you use our current system to track your requests, you can continue to do so, but you’ll need to update any saved links or browser favorites from to  New requests for IT help as of January 6 will be available and can be viewed and interacted with in the new Service Catalog.

Emails have a new look

Email replies sent from the new system will have a different look. The new email notifications will have text wrapped with a gold border. 


So that we can continue to improve our service, we currently ask for your feedback in the last email associated with your request. In our new system, we’ll ask for your feedback in a separate email you’ll receive the day after we’ve resolved your request.

If you have any questions about the new Service Catalog, we can help. Contact us at, or call 7-1111.

VCash Login Screen

Starting Friday, December 6, you will see a new VCASH login screen that resembles Windows 10. The navigation bar at the bottom of the screen will also appear similar to Windows 10. 

Old Login Screen and start menu/taskbar:

Old login screenOld menu









New Login Screen and start menu/taskbar:
New login screen









These changes are from an upgrade to your VCASH server. No changes are being made to the VCASH home screen or the links on the page.