Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

  • Ensure your workstation has been secured as per UISO recommendations.  Contact your IT Pro if you need help.
  • If you have critical or restricted data:
    • Determine where your data is located currently.  If it is already on the workstation, ensure that it is secure, especially if it is restricted or critical data, e.g. PHI.
    • Scrub the data from your workstation or keep it encrypted if it is no longer needed.
    • If the data is also on physical media, e.g. a DVD, ensure that the physical medium is stored in a locked room/cabinet and accessible by authorized users only.  After the project is over, ensure that the media is either destroyed or secured.
    • Be aware that data transferred to other systems (e.g. via the web) arrives there unencrypted even if your workstation or device is encrypted (also known as full-disk or whole-disk encryption).
  • No labels