- HOME
- About Research IT
- Campus Resources
- Endpoint Support & Network Services
- Application Infrastructure & Technical Solutions
- Research Computing & Cyberinfrastructure
- Research Data Security
- Reporting Data & Analytics
- Strategic & Tactical Planning
- Business Analysis & Project Management
- Work Coordination & Facilitation
- HOME
- About Research IT
- Campus Resources
- Endpoint Support & Network Services
- Application Infrastructure & Technical Solutions
- Research Computing & Cyberinfrastructure
- Research Data Security
- Reporting Data & Analytics
- Strategic & Tactical Planning
- Business Analysis & Project Management
- Work Coordination & Facilitation
Physical Device Security
- Unauthorized Access to Device:
- Leaving a device unlocked could lead to unauthorized access to the device and the data able to be accessed through it.
- Unauthorized access to the device could also lead to malicious dongles or software being added to the device.
- Loss of device:
- From being rendered inoperable
- Stolen
- Sanitation of data:
- Unless otherwise specified, data should be wiped from devices when they are being retired from a project
- CSU Surplus has a sanitation service to securely wipe or destroy devices following industry best practices