{"id":113219,"date":"2018-03-16T10:29:32","date_gmt":"2018-03-16T14:29:32","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/?page_id=113219"},"modified":"2020-08-28T14:24:39","modified_gmt":"2020-08-28T18:24:39","slug":"secure-computing","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/secure-computing\/","title":{"rendered":"Secure Computing"},"content":{"rendered":"<p>As custodians of University data, we all have responsibilities to secure our data.\u00a0 Here are some strategies for how to safely use, store, and share sensitive data, and exercise overall good computing practices.<\/p>\n<h1><span>Remember, data security is the law<\/span><\/h1>\n<p>Data security practices are not just required by University Policies, but by State and Federal privacy and security laws, including the Gramm-Leach Bliley Act (GLBA) and the Family Educational Privacy Rights Act (FERPA).\u00a0 University policies and procedures help us understand how to comply with the law in our BU community, including the <a href=\"http:\/\/www.bu.edu\/policies\/information-security-home\/safeguarding-information-gramm-leach-bliley-act\/\">GLBA Safeguarding Information Program<\/a>.\u00a0 GLBA compliance is especially important for employees who work with student financial aid, as the University has committed to safeguarding this data in connection with its receipt of federal financial aid.\u00a0 Other Policies and Procedures can be found on our <a href=\"http:\/\/www.bu.edu\/policies\/\">BU Policies webpage<\/a>, under the <a href=\"http:\/\/www.bu.edu\/policies\/policy-category\/information-management\/\">Information Management category<\/a>.<\/p>\n<h1><span>Know your data<\/span><\/h1>\n<p>The first step to making sure you are properly handing University data is to know how the data is classified.\u00a0 At BU, data is classified into four categories: public, internal, confidential, and restricted use.\u00a0 Each category has its own set of criteria for how data can be used, stored, and shared.\u00a0 The University\u2019s <a href=\"http:\/\/www.bu.edu\/policies\/data-classification-policy\/\">Data Classification Policy<\/a> will help you easily identify the categories of University data in your possession.\u00a0 Once you know the data\u2019s classification, you will know how you are expected to secure it.<\/p>\n<p><a href=\"\/tech\/files\/2018\/03\/infosecscale.jpg\"><img loading=\"lazy\" src=\"\/tech\/files\/2018\/03\/infosecscale-636x429.jpg\" alt=\"infosecscale\" width=\"636\" height=\"429\" class=\"alignnone size-medium wp-image-113222\" srcset=\"https:\/\/www.bu.edu\/tech\/files\/2018\/03\/infosecscale-636x429.jpg 636w, https:\/\/www.bu.edu\/tech\/files\/2018\/03\/infosecscale-768x517.jpg 768w, https:\/\/www.bu.edu\/tech\/files\/2018\/03\/infosecscale.jpg 932w\" sizes=\"(max-width: 636px) 100vw, 636px\" \/><\/a><\/p>\n<h1>Protect your passwords<\/h1>\n<p>Never share your passwords! Your account passwords should be known by you, and you alone.\u00a0 Service providers will <em>never <\/em>ask you for your password, so you should not provide it even when a request seems authentic.\u00a0 If you need to reset a password, make sure that the site you are on is legitimate.\u00a0 If you are unsure if a website is legitimate or not, you can always ask <a href=\"mailto:ithelp@bu.edu\">ithelp@bu.edu<\/a> for help.<\/p>\n<h1>Send email securely<\/h1>\n<p>When you are sending email with Restricted Use information, which is defined within our <a href=\"http:\/\/www.bu.edu\/policies\/data-classification-policy\/\">Data Classification Policy<\/a>, you should use a secure method to transmit the data.\u00a0 Options at BU include encrypting your document and calling the receiver to share the encryption password with them verbally, or using DataMotion, a service available to the BU community.\u00a0 More information about how to use DataMotion SecureMail to send emails can be found on the <a href=\"https:\/\/www.bu.edu\/tech\/services\/cccs\/email\/datamotion\/\">BU TechWeb page<\/a>.<\/p>\n<h1>Be cautious of links or requests for information in emails<\/h1>\n<p>Phishing messages are emails that look as if they are from a legitimate source in an attempt to get you to click on corrupted links or share personal information, such as credit card numbers or passwords.\u00a0 They are a major security concern and the most common cause of data breaches.\u00a0 Fraudulent links are the most common scammer technique because it is easy to disguise a link look as if it is to a legitimate, trusted source, when in reality it leads to a malicious site.\u00a0 To find out if the link is misleading, you can hover (but don\u2019t click) your mouse over the link to see the actual address.\u00a0 If the hover technique shoes you that the address is different than the link presents, it is a scam.\u00a0 On a smartphone, click and hold the link and the address will appear.\u00a0 Also, instead of clicking on an email link, you can just manually type the address into your browser.\u00a0 Note that savvy phishing emails can even look like they are from BU\u2019s IS&amp;T department.\u00a0 Learn more ways to spot a phishing email, and tips to prevent falling prey to fraudulent links on a <a href=\"https:\/\/www.bu.edu\/tech\/\">BU TechWeb page<\/a> titled <a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/phishing\/\">How to Fight Phishing<\/a>.<\/p>\n<h1>Encrypt your computer<\/h1>\n<p>We recommend encryption for all devices storing University data, including laptops, desktops, personal computers and devices like cell phones and tablets. Encryption is required if you are working with restricted use data, and recommended for all other data categories.\u00a0 IS&amp;T is happy encrypt workstations that they manage directly, and will provide advice on encrypting devices they don\u2019t.\u00a0 It is possible that your device may already be encrypted, but if you are not certain, please contact IS&amp;T.\u00a0 More information on encryption can be found on a <a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/securing-your-devices\/\">BU TechWeb page<\/a>.<\/p>\n<h1>Secure all your devices and hardware<\/h1>\n<p>It\u2019s important to make sure that all of your computers and devices that house University data are secure, including mobile phones, tablets, and even thumb drives or other external storage devices. To keep your devices and hardware secure, always make sure your software is up to date, that strong and unique passwords are enabled, and your data is backed up to a secondary source.\u00a0 For more detailed information on device security, please visit the <a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/securing-your-devices\/\">Securing Your Devices TechWeb page<\/a>.<\/p>\n<h1>Keeping Data Secure in the Workplace<\/h1>\n<p>Sensitive information should never be kept on publicly accessible desktops and other physical areas, like counters, tops of filing cabinets, tables, printers, copiers, and fax machines.\u00a0 Offices with any personal information should be locked at night.\u00a0 When records with personal information have met their retention and are ready to be disposed of, they should be disposed of in a secure way, such as secure shredding, burning, and pulverization.\u00a0 See the <a href=\"http:\/\/www.bu.edu\/policies\/record-retention\/\">Record Retention Policy<\/a> for more information on record retention and destruction.<\/p>\n<h1>When in doubt, ask for help<\/h1>\n<p>IS&amp;T is always happy to help.\u00a0 If you have any questions on how to work with University data in a safe and secure manner, don\u2019t hesitate to reach out at <a href=\"mailto:ithelp@bu.edu\">ithelp@bu.edu<\/a> or (617) 353-HELP (4357).<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As custodians of University data, we all have responsibilities to secure our data.\u00a0 Here are some strategies for how to safely use, store, and share sensitive data, and exercise overall good computing practices. Remember, data security is the law Data security practices are not just required by University Policies, but by State and Federal privacy&#8230;<\/p>\n","protected":false},"author":13352,"featured_media":0,"parent":101545,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/113219"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/13352"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=113219"}],"version-history":[{"count":9,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/113219\/revisions"}],"predecessor-version":[{"id":130644,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/113219\/revisions\/130644"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/101545"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=113219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}