Physical access to unsecured systems, devices, and notes can lead to data loss or theft of intellectual property and valuable equipment.
faculty researchers Admin staff IT staff students
Encrypting your data provides an extra layer of protection in case the physical device is lost or stolen.
Should your physical device be lost or stolen, it is important that you have the necessary backups to recover from.
It is recommended you use a "double-locked" solution, meaning a private office/workspace with lockup capabilities (filing cabinet, safe, etc.)
Do not leave devices unattended in open spaces, regardless of how quickly you might return. Consider using a cut- and drill-proof locking cable to prevent grab-and-run incidents.
Do not leave devices unattended in visible, but private spaces like near office windows or visible from a car window to prevent break-ins and theft.
Be sure to consult with the following documentation published by the Human Research Ethics Unit.
Establish a log or check-in/out system for when portable devices and hard copy data are used by a team member.
Allowing someone to use or borrow your device could provide them access to locally stored data.
General
Contact us | Information Security (IS)
Contact us | Information Technology (IT)
Researchers
Research Information Security - Information Security at University of Toronto