• Acadia Home
  • Apply
  • Donate
  • myAcadia
Acadia University Logo
  • Open Search
  • Search Acadia
  • Acadia Home
  • Apply
  • Donate
  • myAcadia
Acadia University Logo Acadia University
  • Navigate Acadia
  • Close Menu
Skip navigation
  • Home
  • Privacy and Security Pledge
  • Policies & Guidelines
    • Commitment to Privacy
    • Personal Information
    • Disclosure of Information
    • Request for Access to Information
    • Breaches
  • Resources
    • Privacy and Data Security Tools
  • myAcadia
  • Apply
  • Donate
 
  • Open Search
  • Search Acadia
  • Search Acadia

Privacy & Data Security

Report Concern

Tools Associated with Privacy and Data Security

Cybersecurity

Phishing Awareness - Recognize the Red Flags

Safe vs. Unsafe Links: Learn how to detect Domain Doppelgangers

Phish Alert Button (PAB)

Privacy Access Basics

Summary of Authorities under Freedom of Information and Personal Information International Disclosure Acts

Access to Privacy Basics for Staff (PowerPoint)

Access to Privacy Basics for Staff (PDF)

Office of Privacy Commissioner of Nova Scotia(OIPC) Instant Messaging Guide

Office of Privacy Commissioner of Nova Scotia(OIPC) Big Data Guidelines

Information Access and Requests

Five Minute Privacy Checkup

Form 1: Application for Access to a Record

How to Make An Access to Information Request

Release of Student Information

Privacy Commissioner - Steps to Respond to a Privacy Breach

 

Skip navigation
  • Home
  • Privacy and Security Pledge
  • Policies & Guidelines
  • Resources
    • Privacy and Data Security Tools
 

KnowBe4.com Blog

Assess Your Company’s Cybersecurity Readiness in 8 Questions

Data breaches have become way too common in today’s digital age. In fact, even the biggest corporations end up falling victim to a cyber attack—even LinkedIn and Facebook were unexempted. With that, the question now isn’t “Is my business going…

5 Examples of Strong Passwords That Will Secure Any Account

Passwords, our digital keys, wield a quiet power today. They protect everything from personal details to financial assets, making them prime targets for hackers. With this power comes responsibility and the ongoing struggle to keep our virtual lives secure. To…

Why Organizations Need Data-Centric Security Strategies

Many employees are celebrating the recent shift to remote and hybrid work. However, some security specialists and compliance experts are not as thrilled. Digitalization, cloud computing, and Software as a Service (SaaS) bring new freedom and flexibility to organizations and…

Management of technical vulnerabilities

Information systems are not equally safe or vulnerable to cyber attacks. Cyber criminals look for entry points that make it easier to break in, steal data, or do damage to systems. To illustrate, think of a burglary attempt. If an…

Electric Vehicle Cyber Security: Are EVs Safe from Hackers?

It’s a simple fact: electric vehicles (EVs) are rapidly becoming a prominent fixture of everyday life. Global warming and climate issues are accelerating the adoption of this transportation method running on renewable energy. EVs also feature many technological innovations that…

Acadia University Logo

Like Nowhere Else

Acadia University 15 University Avenue
Wolfville, Nova Scotia B4P 2R6 Canada

Acadia University Logo

Acadia University is located in Mi'kma'ki, the ancestral and unceded territory of the Mi’kmaw nation.