保护笔记本电脑和平板电脑内容

Take security measures to protect the 信息 stored on your laptop or tablet!

Here are some rules that we recommed to follow when it comes to protecting your laptop.

未知的软件, 或者来自未知来源的软件, 可能包含病毒或其他恶意应用程序.  小心你在设备上加载的内容.

Protect your laptop or tablet from virus infection and other malware by keeping control of what is loaded onto it. Only you or a trusted computer service technician should install applications or download to your device.

不要给任何人密码或访问码. Do not let friends, children, or colleagues use your laptop or tablet. These persons could unintentionally cause security breaches, view or copy 保密个人和/或 专有的 信息, and download suspicious software or games that contain viruses or other malicious applications. Consider using various methods to thwart other users from gaining access to your device, 比如门禁钥匙或生物识别设备

你的密码应该至少包含8个字符, 并且混合使用大写字母, 小写, 数字, 和特殊字符. 不要在你的密码中使用名字或单词. (了解更多 密码注意事项.)

Some devices are delivered with a built-in encryption functionality that destroys all the data on the hard disk if the disk is removed from the computer. 如果你无法使用这项技术, consider using software to encrypt all the data on your device to help keep your 信息 private, 即使你的设备被偷了. 除了, many applications, such as Microsoft Word and Excel, have encryption functionality. 然而, any sensitive and/or 保密 level 1 or level 2 university data that is stored on the device must be encrypted. 敏感和/或机密文件包括, 但不限于, 紧急联系人名单或其他人员名单, 学生花名册, 研究文档, 预算, 奖助金, 纪律处分文件, 业绩评估, 学生申请, 成绩单, 事务性费用/收入, 以及财务信息. Ask your ITC for instructions on encrypting your data.

Also delete cookies, files, temporary cache, and history.

Do not install or load anything of a 个人 nature (e.g., 保密 信息 like SSN, names and addresses, etc.).

Unauthorized users may breach 保密ity or security. View your device as you would your desktop computer where you are the only authorized user.

You may be breaching 保密ity or security if others can view your device screen while you are working on sensitive material. Consider purchasing and using a security screen that can be placed over your screen to ensure others don't see the contents of what is displayed on your screen. Make sure no one can watch you type your password or other 保密 信息.

杀毒软件 must be installed on the laptops and tablets and updated regularly to ensure that the device is fully protected. The campus standard is to update anti-virus software to all workstations daily, and this is the minimum requirement for laptops and tablets as well. Since there is no guarantee that the device will be connected to the campus network for the daily upgrade, 下载更新是用户的责任. Others should download daily updates from their anti-virus software’s manufacturer’s Web site.

To be kept current with the latest security functionalities, the operating system and applications must be patched and updated regularly.

Performing daily backups is a good practice on any computer. 旅行前做好备份. Have a business resumption plan in case your device is stolen or experiences an unrecoverable operating failure. 没有备份, 可能需要几个小时, 周, or months – or be impossible – to reconstruct your data. Back up your data onto an external electronic storage device (CD, DVD,  external hard drive, etc.).

Employing software to “hide” the 信息 on the device’s hard drive will help prevent access to it by unauthorized users. Also consider using software that overwrites deleted files so that others cannot recover them. USB keys and bitwipers would be a good place to start

Applications can be installed on laptops and tablets that emit a signal to a satellite or Internet so that the location of the device can be monitored at all times (similar to many anti-theft vehicle recovery systems). 除了, in the event of theft or unauthorized entry and your is located, some services allow a signal to be sent to your device that securely wipes all the contents on the hard drive.

Just like any other computer, you should protect your device from power surges. Do not connect it to power lines or copper phone lines if there is a chance of a storm or lightning. 尽可能使用UPS (uninterrupted power supply)供电.

小心谨慎. 附件可能含有病毒.

通过点击链接, you may unintentionally start downloading a virus or a web page that automatically starts downloading a virus.

For remote access into GET, GETLA, and CMS applications must be through a secured VPN 连接.