Information Technology Services (ITS)
University of Memphis Photo
Personal Information Security Related Topics

Personal Information Security - Some things to remember:

  1. Social Networking -
    THINK before you sign up for online groups.  They often solicit personal information in order for you to join.  Once you provide that information, you have NO CONTROL over how it’s usedNEVER provide your UoM credentials (password, UUID, etc.) to any social network, company, or even your best friend.

  2. Phishing -
    is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.   The University of Memphis will never request personal information (i.e., your SSN, UUID and password, birth date, or any account numbers) via email.   Other institutions, such as your bank, credit card company, or loan officers, would not email you requesting this type of information, either.

  3. E-mail Scams -
    are unsolicited emails that claim the prospect of a bargain or something for nothing. Some spam messages ask for business, others invite victims to a website with a detailed sales pitch.  Once the email is opened, malware of various sorts may be triggered.  While our spam filters catch most of these emails, be alert and delete any suspicious emails without opening them. Use caution in replying to any unsolicited email.

  4. Phone scams -
    Unsuspecting phone customers receive voicemail messages with call back numbers in Caribbean area codes (examples:  Area Codes 809, 876, and 284).  When calls are made to those numbers, callers are kept on the line with pitches that result in hefty charges.  Because these are legitimate area codes, they cannot be blocked.  So be alert to these scams, and call back ONLY when you know that the call is authentic.

  5. Portable and Hand-Held Devices -
    Remember that PDAs, notebooks, iPads, smart phones, etc. are also vulnerable to security breaches.  Be cautious about what information you store on your mobile devices, so that you are less vulnerable if a device is lost or stolen.

If you are in doubt about popular scams, these websites offer information:

Security Standards and Procedures

Text Only | Print | Got a Question? Ask TOM | Contact Us | Memphis, TN 38152 | 901/678-2000 | Copyright 2015 University of Memphis | Important Notice | Last Updated: 
Information Technology Services | 100 Administration Bldg. | Phone: 901.678.8888 | Email:
Last Updated: 3/25/14