Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
Purpose
Physical access to unsecured systems, devices, and notes can lead to data loss or theft of intellectual property and valuable equipment.
👥Audience
Status | ||
---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
On this page
Expand | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||
|
Initial considerations
IsEncrypt your data and/or
device encrypted?devices.
WhatEncrypting your data provides an extra layer of protection in case the physical device is lost or stolen.
Encrypt my devices or data
Establish a resilient backup strategy and back up your data.
Should your physical device be lost or stolen, it is important that you have the necessary backups to recover from.
What can I do?
🗄️Store hard copy data and portable devices in a secure environment.
It is recommended you use a "double-locked" solution, meaning a private office/workspace with lockup capabilities (filing cabinet, safe, etc.)
Do not leave devices unattended in open spaces, regardless of how quickly you might return. Consider using a cut- and drill-proof locking cable to prevent grab-and-run incidents.
Do not leave devices unattended in visible, but private spaces like near office windows or visible from a car window to prevent break-ins and theft. 🔬
For researchers
:Be sure to consult with the following documentation published by the Human Research Ethics Unit.
Keep an inventory of all devices, information, and services related to your work or project.
Asset (device and/or data) managementmanagement; data and devices
Establish a log or check-in/out system for when portable devices and hard copy data are used by a team member.
Don’t allow unauthorized people
usingto use or
borrowingborrow your devices.
Allowing someone to use or borrow your device could provide them access to locally stored data.
Securely delete all data from a device before surrendering or disposing of it.
Securely delete Delete or destroy data and devices and data
Take additional precautions should be taken while travelling.
Keep my data safe while travelling or working Travel or work remotely
Page Properties | ||||||
---|---|---|---|---|---|---|
| ||||||
|
|
Search
Live Search | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Additional help
General
uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/
Additionalhelp#%F0%9F%9B%A1%EF%B8%8FInformation-uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/
Additionalhelp#%F0%9F%96%A5%EF%B8%8F-Informationus#Information-Technology-(IT)
expandResearchers
https://security.utoronto.ca/services/research-information-security-program/
\uD83D\uDCCBRelated
Related articles
Filter by label (Content by label) | ||||||||
---|---|---|---|---|---|---|---|---|
|