|Title||Start Date & Time||End Date & Time|
|Service Restored: Red Hat Licensing Issues||Thursday, November 29, 2018 - 9:20am|
|Service Maintenance Scheduled: Networks in Multiple Buildings||Monday, November 26, 2018 - 6:00pm||Wednesday, January 23, 2019 - 10:00pm|
Identity Finder is software that helps prevent identity theft by discovering Personally Identifiable Information (PII) and sensitive data on computers, such as credit card or social security numbers, enabling users to take action to properly protect the information.
For more detail on how it works and what is scanned please the Sprion Overview page for more information.
At this time, the service is for CU Boulder campus faculty (including teaching assistants and Emeritus faculty) and staff (including student employees).
Yes. Spirion (formerly Identity Finder) replaces both spider and SENF for Windows and Mac based PC's, in most cases. There is no Identity Finder client for Linux. The IT Security Office recommends and supports the SENF tool for Linux based systems.
Yes. There is a systemwide policy regarding security of private data. Please review IT Security in University Operations, Continuity, and Contracting .
Additional guidelines are available at:
The IT Security Office works with you to protect private information and to investigate potential breaches in the event that your computer is compromised or stolen. For instance, if your laptop is stolen along with your proof (the reports) ensuring all private data is secure, the IT Security Office would be able to look at the log file and attest that no private information was compromised.
The IT Security Office aggregates logs to help campus and departmental leadership understand how many systems maintain private data within their area. The IT Security Office will also use Spirion logs when working with departments to ensure that web Internet-accessible servers do not store private information.
No, The IT Security Office will only have access to the reports stating what type of private data was discovered and how many instances.
See the Private data quick reference guide.
When in doubt about what to do contact the IT Security Office (ITSO) at firstname.lastname@example.org. The general rule is if you don’t need it Shred IT!
When the software is performing a scan of the system, it is likely that your computer will perform slower, depending on the machine and amount of data to be scanned. The setting for how much of an impact a scan is on performance can be adjusted; however, the scan will take longer to complete. You can still work on your computer during a scan.