- Ensure that your workstation has been secured as per UISO recommendations. Contact your IT Pro if you need help.
- If you have critical or restricted data:
- Determine where your data is located currently. If it is already on the workstation, ensure that it is secure, especially if it is restricted or critical data, e.g. PHI. Scrub the data from your workstation or keep it encrypted if it is no longer needed. in your environment:
- If the data is also on physical media , e.g. such as a DVD, ensure that the physical medium it is stored in a locked room/cabinet and accessible by authorized users only.
- Keep the media until the project is over as protection against accidental erasure.
- After the project is over, ensure that the media is
- handled as per rules or regulations to which the data is subject. This may involve physical destruction or secure erasure.
- If the data is on the workstation, ensure that it is encrypted.
- Scrub the data from your workstation or keep it encrypted if it is no longer needed.
- Check to see if the rule or regulation the data is subject to has specific disposal requirements.
Warning | ||
---|---|---|
| ||
Data transferred from your workstation or device to other systems arrives unencrypted even if the workstation or device is full disk or whole disk encrypted. Do not transfer it to a location where unauthorized users can access it, for instance a public folder or a group folder accessible by users with who you don't want to share. |