At Broward College, protecting personally identifiable information (PII) is essential for maintaining security and trust within our academic community. PII includes sensitive data such as Social Security numbers, health records, credit card details, and even your name and birthday combinations. Cybercriminals actively seek this information because it is powerful and personal. Follow these steps to help you guard this data like your GPA depends on it.

  1. Collect Only What is Needed
    Before requesting or recording information, consider whether it is truly necessary. For instance, leave this sensitive information out if a Social Security number is not essential for the task. Less data collected means less risk.
  2. Keep Information Secure
    If you handle PII at Broward College, ensure its protection both physically and digitally:
    • Store digital records in secure, access-controlled systems such as Microsoft Authenticator and OneLogin Protect
    • Keep paper documents in locked cabinets or drawers
  3. Be Thoughtful When Sharing
    • Verify the need - Ensure the recipient genuinely needs the information
    • Minimize details - Share only the information required for the purpose
    • Use secure tools - Send sensitive data via encrypted email or approved communication platforms
    • Split delivery if needed - For extra protection, send general information separately from sensitive data (e.g., email the file, call with account information)
  4. Follow Established Policies
    Know your organization's policies on handling PII and follow them carefully. Follow Broward College's IT security Policies and Procedures for best practices. When in doubt, ask a supervisor or data privacy contact for guidance.
  5. Know Your Rights: Privacy Matters
    You have a legal right to data privacy. Federal and state laws like FERPA, HIPAA, and GDPR(if applicable) protect your personal data. These laws regulate how institutions collect, use, and share PII or PHI. Broward College's privacy policy outlines your rights, including:
    • Requesting access to your stored data
    • Asking for corrections
    • File for corrections if your data is mishandled
    • Opt out of certain data uses, like marketing or research
  6. What to Do If You Think Your Data Was Leaked
    Step 1: Confirm the Breach
    Take action immediately. Check for unusual account activity, emails notifying you of a leak, or alerts from identity monitoring services.

    Step 2: Change Passwords
    Update passwords for all account activity. Use strong, unique passwords. Turn on two-factor authentication (2FA) or multifactor authentication (MFA) where possible.

    Step 3: Report It

    Step 4: Monitor Your Identity
    Sign up for identity monitoring tools to catch fraud early
    Paid and Free Monitoring Options:
    • Identity Guard: Offers advanced monitoring, including credit changed, dark web scans, and identity theft insurance
    • Credit Karma (free): Alerts for credit score changes and account activity
    • Have I Been Pwned (free): Let's you check if your email has appeared in known breaches
    • Experian Free Credit Monitoring: Keeps an eye on your credit report for new activity
Protecting PII is more than just data; it is about trust. Consider how you would want your personal information treated: with respect, care, and confidentiality. The individuals we serve rely on us to handle their data responsibly, just as we would expect others to protect ours.