Many websites have privacy policies explaining what data they collect and how they use it. (Photo Illustration by George Walker | The Collegian)
Cybercriminals employ various methods to attempt to gain access to K-State's secure network, including trying to phish user's credentials. (Photo Illustration by George Walker | The Collegian)