Overview
Follow these practices to secure your workstation and data on your computer.
If you suspect a computer security breach on a computer that may have personally identifiable information or student data, please follow the steps to report a computer security incident.
Steps to Take
Physically secure equipment and workstation
- Close and lock doors of unoccupied spaces, even if gone momentarily
- Install barriers, including door and window locks, tamper-resistant hinges, alarm systems, and other anti-theft devices.
- Install fasteners to protect equipment against earthquake damage.
- Identify UCSD equipment with inventory stickers or other markings.
- Maintain strict key control by using codes and ID cards to access spaces.
- Discard empty boxes immediately after installing new equipment. Don't leave them outside an office or room.
Back up important data
- Follow safe password practices and never share your password.
- Manage data in a way that reflects its sensitivity. Avoid storing sensitive data on your computer whenever practical. Be aware of data that is sensitive and legally protected, whether displayed on a screen, downloaded, or printed.
- Back up data on your machine regularly and store it in a secure location separate from your computer. For example, save data to a shared drive and periodically check that it is readable.
- Do not overwrite backup media unless you are sure that you have a more recent, readable backup.
- Place your computer screen where others can't easily see its display.
- Use a "hot corner" or minimize windows displaying sensitive data.
Additional security practices
- Be sure that someone can access your computer and files if you can't for any reason. (Ask your computer systems support person to identify an appropriate mechanism.)
- Update software regularly, including anti-virus and security patches.
- Don't waste bandwidth by unnecessarily running file-sharing programs, Internet radio, streaming video, and other processes that use large amounts of memory.
- Educate your co-workers if they fail to follow good security practices, and notify your supervisor of any potential problems.
- Register your computer and use your assigned IP address.
- Don’t steal or illegally copy software.