{"version":"1.0","provider_name":"Library &amp; Information Technology Services","provider_url":"https:\/\/www.trincoll.edu\/lits","author_name":"Inghilterra, John M.","author_url":"https:\/\/www.trincoll.edu\/lits\/author\/jinghilt\/","title":"Security Tip: AI &amp; Data Privacy Best Practices","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"5ID05JaADB\"><a href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/\">Security Tip: AI &amp; Data Privacy Best Practices<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/embed\/#?secret=5ID05JaADB\" width=\"600\" height=\"338\" title=\"&#8220;Security Tip: AI &amp; Data Privacy Best Practices&#8221; &#8212; Library &amp; Information Technology Services\" data-secret=\"5ID05JaADB\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Does AI Take Your Data? AI and Data Privacy: Generative AI, including platforms like ChatGPT, DALL-E, Google Gemini, Apple Intelligence, has revolutionized our relationship with technology. Maybe these tools have completely changed how you work and engage with the internet. There seems to be endless ways to use these platforms, many of which are called [&hellip;]","thumbnail_url":"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AI-1900x600-1.png","thumbnail_width":1900,"thumbnail_height":600}