Home

Information Security Risk Advisory Multi

image

Contents

1. OFFICE OF THE CISO UNIVERSITY of WASHINGTON Information Security Risk Advisory Multi Function Devices Copier Printers Faxes Copy machines printers and faxes have evolved from mechanized tools to digital combined multi function devices with Storage that may retain confidential data such as payroll information student information or protected health information that warrants careful protection by law or UW Policies Modern multi function devices may be vulnerable to some of the Same data security breaches as other computing technology If you lease or manage a copy machine printer fax or other multi function device for your department the Office of the Chief Information Security Officer CISO encourages you consider the following e Passwords Passwords should be changed from default manufacturer or contractor default to something unique that is not used for any other equipment e Physical Access multi function devices should only be used by authorized personnel and protected from unauthorized access Closely monitor and promptly remove documents especially those that contain confidential data e Paper jams Remove all documents when clearing a paper jam For added security run a blank copy after a paper jam to ensure that no confidential data Is left in the machine e System Access Limit the number of people who have access to make configuration changes e Secure Data If the device is able to store information and is u
2. g Data From Data sent from the device should only go to intended parties and if confidential should be sent over secure channels This list is not exhaustive Other information security configurations and recommendations may apply to the particular device that you manage For additional information consult with your department IT support person For instructions on how to implement the above recommendations please refer to the user manual for the device or consult with the device provider or manufacturer Resources Data Security Agreement helo uw edu Office of the CISO J uly 2011
3. sed to copy confidential data configure it to securely erase the data after a document is copied e Patching Apply manufacturer patches or updates in a timely manner e Lease If the device will be used for confidential data include data security terms and conditions e Disposal Surplus Securely erase or remove the hard drive when the machine is sent to surplus or returned to the lessor If the device has networking capability confidential data may be exposed to additional risks Network connectivity increases the potential of malicious actors gaining unauthorized access to confidential data If you have a network connected device we encourage you to consider the following e Malware To reduce the risk of exploit and compromise to a multi function device all of the below recommendations should be followed e Remote Access A firewall should be used to limit remote access if the machine needs to be accessed outside of the UW s network e Web Console Many devices come configured with default passwords for services such as web or console management these should be changed to something unique that is not used on any other device e Private IP Consider using a private IP address in order to protect from unauthorized access and or configuration Office of the CISO J uly 2011 e Sending Data To Confidential data should be sent over secure channels in order to reduce the risk of unauthorized third parties gaining access it e Sendin

Download Pdf Manuals

image

Related Search

Related Contents

RayBiotech, Inc. Quantibody Bovine Cytokine Array 2 --  世界初 世界初 - ローランド ディー.ジー.  L`Authentique  

Copyright © All rights reserved.
Failed to retrieve file