Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
🎓

Purpose

Physical access to unsecured systems, devices, and notes can lead to data loss or theft of intellectual property and valuable equipment. 

👥

Audience

Status
titlefaculty
Status
colourBlue
titleresearchers
Status
colourRed
titleAdmin staff
Status
colourPurple
titleIT staff
Status
colourGreen
titlestudents

(question)


On this page

Expand
titleExpand to view table of contents.
Table of Contents
minLevel1
maxLevel4
outlinefalse
styledefault
excludePurpose|Audience|On this page|Search|Additional help|Related articles
typelist
printablefalse

Initial considerations

Is

Encrypt your data and/or

device encrypted?

devices.

 What
  • Encrypting your data provides an extra layer of protection in case the physical device is lost or stolen.

\uD83D\uDCD8

Establish a resilient backup strategy and back up your data.

  • Should your physical device be lost or stolen, it is important that you have the necessary backups to recover from.


What can I do?

🗄️

Store hard copy data and portable devices in a secure environment.

  • It is recommended you use a "double-locked" solution, meaning a private office/workspace with lockup capabilities (filing cabinet, safe, etc.) 

  • Do not leave devices unattended in open spaces, regardless of how quickly you might return. Consider using a cut- and drill-proof locking cable to prevent grab-and-run incidents. 

  • Do not leave devices unattended in visible, but private spaces like near office windows or visible from a car window to prevent break-ins and theft. 🔬

For researchers

:

☑️

Keep an inventory of all devices, information, and services related to your work or project.

  • Asset (device and/or data) managementmanagement; data and devices

  • Establish a log or check-in/out system for when portable devices and hard copy data are used by a team member.

🥸

Don’t allow unauthorized people

using

to use or

borrowing

borrow your devices.

  • Allowing someone to use or borrow your device could provide them access to locally stored data.

🗑️

Securely delete all data from a device before surrendering or disposing of it.

🛫

Take additional precautions should be taken while travelling.

🔍

Page Properties
hiddentrue

Name

Role

Date

Michael Laurentius

Author

Sue McGlashan

Approver (Manager)

Reviewer

Live Search
spaceKeyISH
sizelarge
additionalpage excerpt
placeholderHow do I...
typepage
labelskb-how-to-article,kb-general-concepts,kb-spec-how-to-article

✉️

Additional help

Expandtitle

General

https://

uoft-infosec-cf.atlassian.net

handbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/

Additional

Contact+

help#%F0%9F%9B%A1%EF%B8%8F-Information

us#Information-Security-(IS)

https://

uoft-infosec-cf.atlassian.net

handbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/

Additional

Contact+

help#%F0%9F%96%A5%EF%B8%8F-Information

us#Information-Technology-(IT)

Expandtitle

Researchers

https://security.utoronto.ca/services/research-information-security-program/

\uD83D\uDCCB
 Related

Filter by label (Content by label)
showLabelsfalse
showSpacefalse
excerptTypesimple
cqllabel in ( "encrypt" , "inventory" , "travel" , "secure" ) and title !~ "Physically securing"