Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 12 Next »

🎓 Purpose

Physical access to unsecured systems, devices, and notes can lead to data loss or theft of intellectual property and valuable equipment. 

👥 Audience

FACULTY RESEARCHERS ADMIN STAFF IT STAFF STUDENTS


(question) Initial considerations

  • Is your data and/or device encrypted? Encrypting your data provides an extra layer of protection in case the physical device is stolen.


\uD83D\uDCD8 What can I do?

🗄️ Store hard copy data and portable devices in a secure environment.

  • It is recommended you use a "double-locked" solution, meaning a private office/workspace with lockup capabilities (filing cabinet, safe, etc.) 

  • Do not leave devices unattended in open spaces, regardless of how quickly you might return. Consider using a cut- and drill-proof locking cable to prevent grab-and-run incidents. 

  • Do not leave devices unattended in visible, but private spaces like near office windows or visible from a car window to prevent break-ins and theft. 

  • 🔬 For researchers: https://research.utoronto.ca/data-security-standards-personally-identifiable-other-confidential-data-research

☑️ Keep an inventory of all devices, information, and services related to your work or project.

🥸 Don’t allow unauthorized people using or borrowing your devices.

🗑️ Securely delete all data from a device before surrendering or disposing of it.

🛫 Take additional precautions should be taken while travelling.

  • No labels