Mobile storage devices Any easily movable device that stores University data, including but not limited to laptop computers, smartphones, external hard drives, and USB flash drives.Uninterruptable Power Supply (UPS) A device designed to provide power, without delay, during any period when the normal power supply is incapable of performing acceptably.
University Data Any data related to Kansas State University (University) functions that are a) stored on University information technology systems, b) maintained by K-State faculty staff, or students, or c) related to institutional processes on or off campus. This applies to any format or media (in other words, it is not limited to electronic data). ![]() Core network facilities should have the date and time of entry and departure recorded. Office doors All office doors should remain locked after hours or when offices are unattended for a prolonged period of time. Mobile storage devices Mobile storage devices should be stored securely when unattended. Appropriate secure storage methods include a locking security cable attached directly to the device, storage in a locked cabinet or closet, storage in a locked private office, or the like. Encrypting data stored on mobile devices, such as whole disk encryption on laptop computers, likewise reduces the risk of a breach of University Data resulting from theft, loss, or unauthorized access. When traveling with mobile storage devices or using them in public places, appropriate security precautions should be taken to prevent loss, theft, damage, or unauthorized access. Physical Security Policy Software On LaptopUse of tracking and recovery software on laptop computers is encouraged. Environmental Security Electrical power Electrical power for servers hosting enterprise and departmental services must be protected by uninterruptable power supplies (UPS) to ensure continuity of services during power outages and to protect equipment from damage due to power irregularities. Each UPS should have sufficient capacity to provide at least 30 minutes of uptime to the systems connected to it. Physical Security Policy Generator Where FeasibleSystems hosting confidential data should also be protected with a standby power generator where feasible. ![]() This is an international security standard that specifies physical and environmental security controls to protect assets from loss, theft, damage, and unauthorized access. The CIO or designee must approve any exception to this policy or related procedures. Questions should be directed to the Chief Information Security Officer.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |