Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
  • Ensure that your workstation has been secured as per UISO recommendations.  Contact your IT Pro if you need help.
  • If you have critical or restricted data:
  • Determine where your data is located currently.  If it is already on the workstation, ensure that it is secure, especially if it is restricted or critical data, e.g. PHI.
  • Scrub the data from your workstation or keep it encrypted if it is no longer needed. in your environment:
    • If the data is also on physical media , e.g. such as a DVD, ensure that the physical medium it is stored in a locked room/cabinet and accessible by authorized users only
      • Keep the media until the project is over as protection against accidental erasure
      • After the project is over, ensure that the media is
      either destroyed or secured.Be aware that data transferred to other systems (e.g. via the web) arrives there unencrypted even if your workstation or device is encrypted (also known as full-disk or whole-disk encryption)
      • handled as per rules or regulations to which the data is subject.  This may involve physical destruction or secure erasure.
    • If the data is on the workstation, ensure that it is encrypted.
    • Scrub the data from your workstation or keep it encrypted if it is no longer needed. 
      • Check to see if the rule or regulation the data is subject to has specific disposal requirements.



Warning
titleEncryption Myth

Data transferred from your workstation or device to other systems arrives unencrypted even if the workstation or device is full disk or whole disk encrypted.  Do not transfer it to a location where unauthorized users can access it, for instance a public folder or a group folder accessible by users with who you don't want to share.