🎓 Purpose
Physical access to unsecured systems, devices, and notes can lead to data loss or theft of intellectual property and valuable equipment.
👥 Audience
Status |
---|
colour | Blue |
---|
title | researchers |
---|
|
Status |
---|
colour | Red |
---|
title | Admin staff |
---|
|
Status |
---|
colour | Purple |
---|
title | IT staff |
---|
|
🔖 Contents
Table of Contents |
---|
minLevel | 1 |
---|
maxLevel | 3 |
---|
include | |
---|
outline | false |
---|
indent | |
---|
style | default |
---|
exclude | Purpose|Audience|Contents|Search|Additional help|Related articles |
---|
type | list |
---|
class | |
---|
printable | false |
---|
|
Initial considerations
🔒 Encrypt your data and/or devices.
💽 Establish a resilient backup strategy and back up your data.
\uD83D\uDCD8 What can I do?
🗄️ Store hard copy data and portable devices in a secure environment.
It is recommended you use a "double-locked" solution, meaning a private office/workspace with lockup capabilities (filing cabinet, safe, etc.)
Do not leave devices unattended in open spaces, regardless of how quickly you might return. Consider using a cut- and drill-proof locking cable to prevent grab-and-run incidents.
Do not leave devices unattended in visible, but private spaces like near office windows or visible from a car window to prevent break-ins and theft.
🔬 For researchers: https://research.utoronto.ca/data-security-standards-personally-identifiable-other-confidential-data-research
🥸 Don’t allow unauthorized people to use or borrow your devices.
🗑️ Securely delete all data from a device before surrendering or disposing of it.
🛫 Take additional precautions should be taken while travelling.
Page Properties |
---|
|
Name | Role | Date |
---|
Michael Laurentius | Author | | Sue McGlashan | Approver (Manager) | | | Reviewer | |
|