{"id":8821,"date":"2025-03-31T00:01:21","date_gmt":"2025-03-31T04:01:21","guid":{"rendered":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/ai-data-privacy\/"},"modified":"2026-02-02T16:43:05","modified_gmt":"2026-02-02T21:43:05","slug":"ai-data-privacy","status":"publish","type":"page","link":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/","title":{"rendered":"Security Tip: AI &amp; Data Privacy Best Practices"},"content":{"rendered":"<h2><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8833\" src=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AI-1900x600-1.png\" alt=\"\" width=\"1900\" height=\"600\" srcset=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AI-1900x600-1.png 1900w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AI-1900x600-1-300x95.png 300w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AI-1900x600-1-1024x323.png 1024w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AI-1900x600-1-768x243.png 768w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AI-1900x600-1-1536x485.png 1536w\" sizes=\"auto, (max-width: 1900px) 100vw, 1900px\" \/><\/h2>\n<h2 class=\"p1\"><i>Does AI Take Your Data? <\/i><i>AI and Data Privacy:<\/i><\/h2>\n<p>Generative AI, including platforms like ChatGPT, DALL-E, Google Gemini, Apple Intelligence, has revolutionized our relationship with technology. Maybe these tools have completely changed how you work and engage with the internet. There seems to be endless ways to use these platforms, many of which are called large language models (LLMs). These chatbots can assist with brainstorming, writing, and even coding\u2014but they also can be significant risks when used carelessly. One of the biggest concerns? Employees inadvertently expose sensitive company information.<\/p>\n<blockquote>\n<p class=\"p1\"><i>A <\/i><span class=\"s1\"><i>2024 National Cybersecurity Alliance &#8220;Oh Behave&#8221; <\/i><\/span><i>report found that 65% of us are concerned about AI-related cybercrime, and most <\/i><i>people (55%) haven\u2019t received any training about using AI securely. <\/i><i>First and foremost, when you\u2019re using an AI tool, think about what you\u2019re sharing and how it could be used.<\/i><\/p>\n<\/blockquote>\n<h2 class=\"p1\">Think intelligent about AI<img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-8847 size-large\" src=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AIDataBP-301x1024.jpg\" alt=\"\" width=\"301\" height=\"1024\" srcset=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AIDataBP-301x1024.jpg 301w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AIDataBP-88x300.jpg 88w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AIDataBP-768x2611.jpg 768w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AIDataBP-452x1536.jpg 452w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AIDataBP-602x2048.jpg 602w, https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AIDataBP-scaled.jpg 753w\" sizes=\"auto, (max-width: 301px) 100vw, 301px\" \/><\/h2>\n<p class=\"p2\">AI models process and store data differently than traditional software. Public AI platforms often retain input data for training purposes, meaning that anything you share could be used to refine future responses\u2014or worse, inadvertently exposed to other users.<\/p>\n<p class=\"p1\">Here are the major risks of entering sensitive data into public AI platforms:<\/p>\n<ul>\n<li class=\"p1\">Exposure of private company data \u2013 Proprietary company data, such as project details, strategies, software code, and unpublished research, could be retained and influence future AI outputs.<\/li>\n<li class=\"p1\">Confidential customer information \u2013 Personal data or client records should never be entered, which could lead to privacy violations and legal repercussions.<\/li>\n<\/ul>\n<p class=\"p1\">Many AI platforms allow you to toggle off the use of what you enter for training data, but you shouldn\u2019t trust that as an ultimate failsafe. Think of AI platforms as social media: if you wouldn\u2019t post it, don\u2019t enter it into AI.<\/p>\n<h2 class=\"p1\">CHECK BEFORE YOU USE AI AT WORK<\/h2>\n<p class=\"p2\">Before integrating AI tools into your workflow, take these critical steps:<\/p>\n<ol>\n<li class=\"p3\">Review company AI policies \u2013 Many organizations now have policies governing AI use. Check whether your company allows employees to use AI and under what conditions.<\/li>\n<li class=\"p3\">See if your company has a private AI platform \u2013 Many businesses, especially large corporations, now have internal AI tools that offer greater security and prevent data from being shared with third-party services.<\/li>\n<li class=\"p3\">Understand data retention and privacy policies \u2013 If you use public AI platforms, review their terms of service to understand how your data is stored and used. Specifically look at their data retention and data use policies.<\/li>\n<\/ol>\n<h2 class=\"p1\">HOW TO PROTECT YOUR DATA WHILE USING AI<\/h2>\n<p class=\"p2\">If you\u2019re going to use AI, use it safely!<\/p>\n<ul>\n<li class=\"p3\">Stick to secure, college-approved AI tools at work. If you are unaware, check with your supervisor about what to do.<\/li>\n<li class=\"p3\">Think before you click\u2014Treat AI interactions like public forums. Don\u2019t enter information into a chatbot if you wouldn\u2019t share it in a press release or post it on social media.<\/li>\n<li class=\"p3\">Use vague or generic inputs \u2013 Instead of inputting confidential information, use general, nonspecific questions as your prompt.<\/li>\n<li class=\"p3\">Protect your AI account with strong passwords and MFA\u2014Protect your AI account like all your other ones: use a unique, complex, and long <span class=\"s1\">password<\/span> (at least 16 characters). Enable <span class=\"s1\">multi-factor authentication (MFA)<\/span>, which will add another solid layer of protection.<\/li>\n<\/ul>\n<h2 class=\"p1\">Increase your AI IQ<\/h2>\n<p class=\"p2\">Generative AI is powerful! But you are wise. Use AI intelligently, especially when sensitive data is involved. By being mindful of what you share, following college policies, and prioritizing security, you can benefit from AI without putting the college at risk.<\/p>\n<p class=\"p2\">You can learn more about AI safety and many more cybersecurity topics by signing up for the National Cybersecurity Alliance <a href=\"https:\/\/www.staysafeonline.org\/\"><span class=\"s1\">newsletter<\/span><\/a>!<\/p>\n<p>Oh, and let&#8217;s not forget about deepfakes and audio scams! Scammers always rely on deception to trick people out of their money, but the sudden wide availability of artificial intelligence has increased the convincingness of their schemes. AI can be used to clone voices and even create deepfake videos, so we all need to be vigilant about any incoming communication, from emails and texts to calls and FaceTimes. These tools allow criminals to replicate the voices of family members, coworkers, and even government officials with eerie accuracy. All that is required is a short audio or video clip. However, by <em><strong>creating a safe word<\/strong> <\/em>as a preventative measure, you can stop AI-empowered scams in their tracks. <a href=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/NCA_TipSheet_AIF_Safewords.pdf\" target=\"_blank\" rel=\"noopener\">LEARN MORE!<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Does AI Take Your Data? AI and Data Privacy: Generative AI, including platforms like ChatGPT, DALL-E, Google Gemini, Apple Intelligence, has revolutionized our relationship with technology. Maybe these tools have completely changed how you work and engage with the internet. There seems to be endless ways to use these platforms, many of which are called [&hellip;]<\/p>\n","protected":false},"author":336,"featured_media":0,"parent":11147,"menu_order":8,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-8821","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v25.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Tip: AI &amp; Data Privacy Best Practices - Library &amp; Information Technology Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Tip: AI &amp; Data Privacy Best Practices\" \/>\n<meta property=\"og:description\" content=\"Does AI Take Your Data? AI and Data Privacy: Generative AI, including platforms like ChatGPT, DALL-E, Google Gemini, Apple Intelligence, has revolutionized our relationship with technology. Maybe these tools have completely changed how you work and engage with the internet. There seems to be endless ways to use these platforms, many of which are called [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"Library &amp; Information Technology Services\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-02T21:43:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AI-1900x600-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/\",\"name\":\"Security Tip: AI &amp; Data Privacy Best Practices - Library &amp; Information Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AI-1900x600-1.png\",\"datePublished\":\"2025-03-31T04:01:21+00:00\",\"dateModified\":\"2026-02-02T21:43:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/#primaryimage\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AI-1900x600-1.png\",\"contentUrl\":\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AI-1900x600-1.png\",\"width\":1900,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Technology\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Resources &amp; Tools\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Security Tips\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Security Tip: AI &amp; Data Privacy Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/\",\"name\":\"Library &amp; Information Technology Services\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Tip: AI &amp; Data Privacy Best Practices - Library &amp; Information Technology Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/","og_locale":"en_US","og_type":"article","og_title":"Security Tip: AI &amp; Data Privacy Best Practices","og_description":"Does AI Take Your Data? AI and Data Privacy: Generative AI, including platforms like ChatGPT, DALL-E, Google Gemini, Apple Intelligence, has revolutionized our relationship with technology. Maybe these tools have completely changed how you work and engage with the internet. There seems to be endless ways to use these platforms, many of which are called [&hellip;]","og_url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/","og_site_name":"Library &amp; Information Technology Services","article_modified_time":"2026-02-02T21:43:05+00:00","og_image":[{"width":1900,"height":600,"url":"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AI-1900x600-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/","url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/","name":"Security Tip: AI &amp; Data Privacy Best Practices - Library &amp; Information Technology Services","isPartOf":{"@id":"https:\/\/www.trincoll.edu\/lits\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/#primaryimage"},"image":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AI-1900x600-1.png","datePublished":"2025-03-31T04:01:21+00:00","dateModified":"2026-02-02T21:43:05+00:00","breadcrumb":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/#primaryimage","url":"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AI-1900x600-1.png","contentUrl":"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2025\/03\/AI-1900x600-1.png","width":1900,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/ai-data-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trincoll.edu\/lits\/"},{"@type":"ListItem","position":2,"name":"Technology","item":"https:\/\/www.trincoll.edu\/lits\/technology\/"},{"@type":"ListItem","position":3,"name":"Information Security","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/"},{"@type":"ListItem","position":4,"name":"Resources &amp; Tools","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/"},{"@type":"ListItem","position":5,"name":"Security Tips","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/security-tips\/"},{"@type":"ListItem","position":6,"name":"Security Tip: AI &amp; Data Privacy Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.trincoll.edu\/lits\/#website","url":"https:\/\/www.trincoll.edu\/lits\/","name":"Library &amp; Information Technology Services","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/8821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/users\/336"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/comments?post=8821"}],"version-history":[{"count":0,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/8821\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/11147"}],"wp:attachment":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/media?parent=8821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}