Identity Finder is software that helps prevent identity theft by discovering Personally Identifiable Information (PII) and sensitive data on computers, such as credit card or social security numbers, enabling users to take action to properly protect the information.
For more detail on how it works and what is scanned please visit this helpful information provided by Identity Finder.
At this time, the service is for CU Boulder campus faculty (including teaching assistants and Emeritus faculty) and staff (including student employees).
Yes. Identity Finder replaces both spider and SENF for Windows and Mac based PC's, in most cases. There is no Identity Finder client for Linux. The IT Security Office recommends and supports the SENF tool for Linux based systems.
Yes. There is a systemwide policy regarding security of private data. Please review IT Security in University Operations, Continuity, and Contracting.
Additional guidelines are available at:
Identity Finder reports its findings to the computer user for awareness and quick remediation. Identity Finder also reports the networking address and whether or not unsecured data was found to a server maintained by the IT Security Office. Identity Finder does not report any private data. View sample report below.
The IT Security Office works with you to protect private information and to investigate potential breaches in the event that your computer is compromised or stolen. For instance, if your laptop is stolen along with your proof (the Identity Finder reports) ensuring all private data is secure, the IT Security Office would be able to look at the log file and attest that no private information was compromised.
The IT Security Office aggregates Identity Finder logs to help campus and departmental leadership understand how many systems maintain private data within their area. The IT Security Office will also use Identity Finder logs when working with departments to ensure that web Internet-accessible servers do not store private information.
No, The IT Security Office will only have access to the reports stating what type of private data was discovered and how many instances.
See the Private data quick reference table.
When in doubt about what to do contact the IT Security Office (ITSO) at firstname.lastname@example.org. The general rule is if you don’t need it Shred IT!
When the software is performing a scan of the system, it is likely that your computer will perform slower, depending on the machine and amount of data to be scanned. The setting for how much of an impact a scan is on performance can be adjusted; however, the scan will take longer to complete. You can still work on your computer during a scan.
The default is set to, and it is suggested that scans should occur monthly. For reporting the IT Security Office scans will be required at least quarterly.