OUHSC Information Technology Department


Home  |  Online Help  |  Policies  |  Forms  |  Tier Ones

Secure Your Physical Environment

Related Articles and News
OUHSC Information Technology
Information Security OU College of Nursing Named Top 20 Online Graduate Nursing Program Fellowship Trained Trauma Surgeon Joins Practice Study shows dementia care model delays nursing home admissions, reduces Medicare costs Pediatric Urologist Joins OU Children's Physicians Pulmonary Disease Specialist Joins Practice Psychiatrist Joins OU Physicians Neuroradiologist Joins OU Physicians Pediatric Cardiologist Joins Practice OU College of Nursing Receives Grant to Provide Nursing Home Leadership Training Study shows dementia care model delays nursing home admissions, reduces Medicare costs OU Children’s Physicians Announces Addition of Hematologist Stephenson Cancer Center at OU Medicine Awarded Grant to Provide Mobile Mammography Across State OU Medicine Cancer Researchers Help Uncover Why Obese Patients Have Better Response to Immunotherapy Neuroradiologist Joins OU Physicians The Harold Hamm Foundation Donates $34 Million to Harold Hamm Diabetes Center at OU Medicine Orthopedic Hand Surgeon Joins OU Physicians Fellowship-Trained Otolaryngologist Joins OU Physicians Surgeon Joins OU Physicians Neurosurgeon Joins OU Physicians OU Children’s Physicians Announces Addition of Hematologist-Oncologist Pulmonary Disease/Critical Care Specialist Joins Practice Stephenson Cancer Center Leads Groundbreaking Ovarian Cancer Study Cutting-edge, non-surgical treatment at OU Medicine targets chronic stuffy nose Board-Certified Family Medicine Provider Joins OU Physicians OU College of Public Health to Bear Hudson Name

You know how to secure your car. You lock your doors, store valuable items out of sight, and park in well-lit areas. You even have a fancy alarm system to alert you of intruders. But do you lock the doors on your computer? Any time you walk away from your computer without locking it – even if it’s just a quick trip across the hall – others could potentially access the information on it. That means they could send fake emails from your account or access your sensitive data. It only takes a few seconds to make sure your machine is physically protected when you are not sitting in front of it. So take a moment to look over these quick tips for securing your physical environment.

  • Never leave a mobile device unattended.
  • Lock your workstation when you are not in front of it.
  • If you must leave a mobile device in your vehicle, store it in the trunk. It is best to place it in the trunk before you reach your destination.
  • When traveling, keep your mobile device with you at all times. If you leave your devices in a hotel room, be sure to use a cable lock or store the device in the hotel safe.
  • Use a passcode on your cell phone, especially if you use it to access your email. If your phone is lost or stolen, others could gain access to your email account, Facebook account, and all of your contacts.
  • If your business process requires storage of sensitive data on a portable computing device such as a laptop, flash drive, or Smartphone then that device must be encrypted with a Federal Information Processing Standard encryption mechanism. For more information, please see our Portable Computing Device policy
Click here to view a video!