Purpose
Physical access to unsecured systems, devices, and notes can lead to data loss or theft of intellectual property and valuable equipment.
Audience
Status |
---|
colour | Blue |
---|
title | researchers |
---|
|
Status |
---|
colour | Red |
---|
title | Admin staff |
---|
|
Status |
---|
colour | Purple |
---|
title | IT staff |
---|
|
On this page
Expand |
---|
title | Expand to view table of contents. |
---|
|
Table of Contents |
---|
minLevel | 1 |
---|
maxLevel | 4 |
---|
outline | false |
---|
style | default |
---|
exclude | Purpose|Audience|On this page|Search|Additional help|Related articles |
---|
type | list |
---|
printable | false |
---|
|
|
Initial considerations
Encrypt your data and/or devices.
Establish a resilient backup strategy and back up your data.
What can I do?
Store hard copy data and portable devices in a secure environment.
It is recommended you use a "double-locked" solution, meaning a private office/workspace with lockup capabilities (filing cabinet, safe, etc.)
Do not leave devices unattended in open spaces, regardless of how quickly you might return. Consider using a cut- and drill-proof locking cable to prevent grab-and-run incidents.
Do not leave devices unattended in visible, but private spaces like near office windows or visible from a car window to prevent break-ins and theft.
For researchers
Don’t allow unauthorized people to use or borrow your devices.
Securely delete all data from a device before surrendering or disposing of it.
Take additional precautions should be taken while travelling.
Page Properties |
---|
|
Name | Role | Date |
---|
Michael Laurentius | Author | | Sue McGlashan | Approver (Manager) | | | Reviewer | |
|