- Be aware of the Records Retention Policy and how it applies to your position.
- Be mindful that all email, Google Drive and all other approved electronic storage systems are FOILable.
- Keeping unnecessary multiple unauthorized copies of data increases risk for the University.
- Properly destroy records when there is no longer a legal, historical or operational need for the information.
- Always use an approved encrypted storage solution (e.g. Symantec PGP Fredshare) for storing University owned sensitive information.
Be careful when using public Wi-Fi networks, these are untrusted and you never know who’s on them.
Be sure that your applications are using encryption or VPN services while connecting the the internet whenever possible.
Never use a public computer for work, such as those provided in hotel lobbies, libraries, etc.
Do not allow others to connect their devices (smartphones, USB drives, etc.) to your laptop.
Protect your devices by regularly updating the operating system and applications.
Do not disable any security protections we have in place, such as antivirus or firewall
Information security is part of your responsibility, while we have secure technologies in place, you are our best defense.
If you have questions about information security, or if there is something you don’t understand or cannot do, contact the help desk or information security office right away.
Know, understand, and follow our security policies and procedures at all times. They are here to protect both you and our organization.
Understand the sensitivity of the information you access or handle and the steps to protect that information, including how to safely share it with others.
Only allow authorized personnel access to our facilities.
Watch for someone walking through a secured door behind you without using their secure ID badge, they may be tailgating and don’t have the proper access.
Make sure that secure doors are kept closed and locked.
Keep a clean desk and make sure any secured documents or external drives are stored in a locked cabinet when you leave
To dispose of confidential documents, place them in secure bins designed for shredding or shred sensitive documents so they are unreadable.