- HOME
- About Research IT
- Campus Resources
- Endpoint Support & Network Services
- Application Infrastructure & Technical Solutions
- Research Computing & Cyberinfrastructure
- Research Data Security
- Reporting Data & Analytics
- Strategic & Tactical Planning
- Business Analysis & Project Management
- Work Coordination & Facilitation
- HOME
- About Research IT
- Campus Resources
- Endpoint Support & Network Services
- Application Infrastructure & Technical Solutions
- Research Computing & Cyberinfrastructure
- Research Data Security
- Reporting Data & Analytics
- Strategic & Tactical Planning
- Business Analysis & Project Management
- Work Coordination & Facilitation
Securing Protected Data Environments
- Limiting access to areas containing devices and data with locks
- Keeping a record of who is accessing the environment
- Track access devices such as keys or cards
- Escorting and monitoring visitors
- Keep devices, screens, and keyboards out of sight were possible
- Secure devices when not in use – behind locks, hidden from sight