Computing systems — including desktops and laptops, networking equipment, cell phones, PDAs, and other mobile devices — store many kinds of personal and institutional data. From text messages to emails and contact lists, this data is often sensitive in nature.
Learn how to:
* Protect any devices you’re still using by visiting:
* Securely remove data before disposing or transferring possession of your devices by visiting:
Don’t understand what all of the fuss is about? Read Campus Technology’s article on smart phone security: