保护你的办公室

Things we inadvertently do every day -- like leaving a document in the copier or visible to others on the computer monitor -- can cause serious risk to individual privacy and campus computing resources. Sloppy office security practices, such as improper discarding documents containing sensitive and confidential information, 密码共享, or leaving the office without locking your computer can cause information security breaches. To prevent unauthorized users from accessing your computer, or from knowing confidential information, follow the recommendations listed below. Remember, good office security practices require more than just locking the door!

Often overlooked, the way we handle printed documents can present serious security risks. 以下是一些最佳做法:

  • Use a confetti or pulp shredder when discarding documents containing confidential or personal information. Remember, strip-shredded documents can be easily reassembled.
  • Don't leave documents with personal or confidential information lying on the desk.
  • Remember to lock file cabinets that contain personnel documents.
  • Retrieve confidential documents immediately after sending them to the printer.
  • Stay at the copier to ensure that all originals and copies are removed promptly.
  • Do not delegate tasks to students or others who are not authorized to 视图 the document content.
  • Never leave confidential and sensitive documents unattended. 不使用时, or if you must leave your office, secure them in a locked file cabinet or desk drawer.

Although rarely considered, poor workstation placement can create security problems. Maintain a safety zone for your workstation by following these tips:

  • Locate workstations used to maintain confidential records and documents in locked offices or less-traveled, 安全领域.
  • Lock your workstation every time you walk away from it. (Ctrl-Alt-Delete > 锁定计算机. 当返回, press Crtl-Alt-Delete and input your User name if it is not displayed and your Password).
  • Don't walk away from centrally located workstations with confidential documents still visible on the screen.
  • 对于事务性终端, always close down the screen at the end of each transaction and never walk away leaving the last transaction in full sight.

Protecting security and confidentiality means considering all the electronic mediums that contain information, 并且安全地处理它们. 以下是一些有用的建议:

  • Always lock your computer when you are away from it, even for a short period of time! 新闻 Ctrl + Alt + Delete + Enter (or Ctrl + Alt + Delete 然后点击 锁定计算机 按钮). 要解锁计算机,请按 Ctrl + Alt + Delete and enter your network password.
  • Securely wipe the hard drive(s) of every workstation before redeploying them to other staff or other departments.
  • Securely wipe the hard drive(s) of every retired workstation prior to disposition.
  • Store CDs and Zip disks that contain confidential information in a locked or secured location.
  • Know your department’s policy on the use of USB storage devices.

Department e-mail and voice mailboxes are very convenient because they can be the centralized information depositories for student requests, 问题, and other department information. But the personnel who are allowed to access, 读, 视图, or hear this confidential information should be thoughtfully considered.

  • Mailboxes should be accessed only by those authorized when they receive any confidential and/or sensitive student information, 例如ssn, 经济援助信息, or sensitive 问题 about grades.
  • Student assistants should not have access to a department mailbox that might contain confidential information.
  • 工作人员 employees should never “share” passwords.
  • Individual responsible for retrieving the department mailbox contents should have the authority and approval to handle confidential information.
  • After being retrieved from a department mailbox, messages that contain confidential information should be handled carefully. They should not be forwarded to anyone who does not have the authority to access the confidential information. 和, 如果印刷, they should not be left in the printer or on a desk or counter where they might be accessed by unauthorized individuals.
  • Confidential information should not be placed in Public Folders.