Information Security Awareness
What is Information Security?
Information Security is the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc...)
Securing Information
• Consider establishing a Clean Desk/Clean Screen rule.
• Lock away paper documents when you are away from the desk and before leaving the office.
• Any time you leave your desk, log off or lock the screen on your computer.
Limit Risk to “Restricted & Private” Data
• Use “Restricted & Private” data only when absolutely necessary.
• Do not print or circulate “Restricted & Private” data unless absolutely necessary and only circulate those who are authorized to access them.
What is “Restricted” Data?
• Data that requires the highest level of protection from any unauthorized access, disclosure or tampering, whether in hard copy or digital format. This includes sensitive information about students, faculty, staff, users of University services and facilities, and the University. All personally identifying or electronically protected information (PII) is classified as confidential information, including, but not limited to information governed by local or federal law.
• For more information and the definition of “Confidential Data” at Georgetown, please visit the below link:
GU Computers for GU Data
• Use only secure university-owned computers for university business.
• Do not use other computers for GU work.
• Do not store confidential information on removable media – CD, DVD, thumb drive, etc.
• If you are unsure how to share your data, please contact us.
Email Security
• E-mail must not contain Confidential University information.
• Only University e-mail should be used for University business.
• Do not open software or documents from unknown sources.
• Do not click on links in e-mails or IMs (Instant Messaging.)
• Do not open attachments sent via e-mail or IM, unless you are expecting them.
All technology related purchases must be submitted to the Advancement Helpdesk and must include supervisory approval, cost center, and justification. This includes (but not limited to) orders for hardware, software, mobile devices/accessories, IT supplies and repairs.
________________________________
Advancement Helpdesk Team
202 687 3400 | advhelpdesk@georgetown.edu | advhelpdesk.georgetown.edu