Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
Purpose
Physical access to unsecured systems, devices, and notes can lead to data loss or theft of intellectual property and valuable equipment.
👥Audience
Status | ||
---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
On this page
Expand | |||||
---|---|---|---|---|---|
| |||||
|
|
|
|
|
Initial considerations
🔒Encrypt your data and/or devices.
Encrypting your data provides an extra layer of protection in case the physical device is lost or stolen.
Establish a resilient backup strategy and back up your data.
Should your physical device be lost or stolen, it is important that you have the necessary backups to recover from.
What can I do?
🗄️ Store hard copy data and portable devices in a secure environment.
It is recommended you use a "double-locked" solution, meaning a private office/workspace with lockup capabilities (filing cabinet, safe, etc.)
Do not leave devices unattended in open spaces, regardless of how quickly you might return. Consider using a cut- and drill-proof locking cable to prevent grab-and-run incidents.
Do not leave devices unattended in visible, but private spaces like near office windows or visible from a car window to prevent break-ins and theft. 🔬
For researchers
:Be sure to consult with the following documentation published by the Human Research Ethics Unit.
☑️ Keep an inventory of all devices, information, and services related to your work or project.
Establish a log or check-in/out system for when portable devices and hard copy data are used by a team member.
🥸 Don’t allow unauthorized people to use or borrow your devices.
Allowing someone to use or borrow your device could provide them access to locally stored data.
🗑️ Securely delete all data from a device before surrendering or disposing of it.
🛫 Take additional precautions should be taken while travelling.
Page Properties | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||
|
🔍Search
Live Search | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
✉️Additional help
👥General
https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%9B%A1%EF%B8%8F-Informationus#Information-Security-(IS)
https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%96%A5%EF%B8%8F-Informationus#Information-Technology-(IT)
🔬Researchers
https://security.utoronto.ca/services/research-information-security-program/
\uD83D\uDCCB Related Related articles
Filter by label (Content by label) | ||||||||
---|---|---|---|---|---|---|---|---|
|