Physical Security of Equipment


Requirements and procedures are in support of governing Columbia University IT Policies and CUIMC Information Security Procedures.

Overview

Maintaining the physical security of electronic devices that store, access or transmit institutional data is as important as encryption and password protection, if not more so. Many systems temporarily store or "cache" of at least some information that was accessed, and most are set to save confidential information on the device itself including emails and their attachments. Files that were deleted from the device may still be retrieved if proper, thorough data wiping is not performed.

Equipment including computers, smartphones, USB keys and even a printers or faxes that are left open to physical access by unauthorized persons are at risk. This is true whether equipment was stolen, lost, thrown or given away or simply left unattended. Given enough time, any device can be broken into; securing it physically is the best way to prevent this from happening.

Requirements

Equipment Must Be Physically Secured 

The following requirements apply specifically to methods for physically securing IT equipment. Remember that Computer Use requirements such as implementing good passwords, logging out of programs/systems and encrypting data also apply and help with further securing information if someone is able to physically access the equipment.

Additional Guidelines

The following methods are strongly recommended for all owners and users of computing equipment.

Safeguarding Equipment

Preventing Unintentional Physical Damage

Events ranging from natural catastrophes to spilling liquid or dropping a device can cause costly, time consuming damage. Aside from making sure that your data is routinely backed up so that you can easily access or restore it when necessary, both the device and backup medium(s) should be adequately protected against accidents.