security awareness 9 10 09 v4 protect equip
TRANSCRIPT
its.unc.edu 1
Equipment such as PCs, servers, laptops, fax machines and copiers
must be physically protected.
Protect Your Equipment
Protect Your Equipment
its.unc.edu 2
Equipment & Data Protection
Equipment & Data Protection
Laptops and other portable devices
should never be left unattended or
unsecured.
Computer screens,
copiers, and fax
machines should be placed so that they cannot be
accessed or viewed by
unauthorized
individuals.
Servers and mainframes must
be in a secure area where physical
access is controlled.
Laptops and PCs that are used in open areas
must be protected against theft or
unauthorized access.
Section: Protect Your Equipment
its.unc.edu 3
Mobile devices are for temporary storage only!
Mobile Equipment Data Protection
Mobile Equipment Data Protection
Avoid using mobile storage devices
to store Sensitive Information.
Encrypt the mobile device, if
possible.
If you no longer need to transport
the data, erase it from the mobile
device.Source: http://www.calstatela.edu/security/061019/faq.htm
Section: Protect Your Equipment
its.unc.edu 4
Learning Point # 15Learning Point # 15
Lunchtime! You quickly grab your wallet and hurry to catch up with your friends, who are
already waiting for you in the hall. You do not have to log off from your computer since others are still
working in your office area. Right?
Wrong! Whenever you leave your desk, you must
log off from your computer. Password protection of access to your computer is the best way to secure the information stored on your computer. Never rely on
colleagues in nearby cubicles to keep an eye on your computer.
Section: Protect Your Equipment