CS logo


 

Laptop Security Guidelines

The purpose of these guidelines is to establish best practices for users who are required to use a Temple University owned laptop to conduct University business. It is the user’s responsibility to take appropriate precautions to prevent loss, theft, and/or damage to their laptop and information stored on their laptop. The following guidelines should be followed by all laptop users:

Note: Please refer to the Laptop Security Procedures for additional information on the items listed below.

Laptop Configuration and Use

  1. Select a strong password for all user accounts not managed by TUsecure.

  2. Configure your screen saver to be password protected and to activate in 25 minutes or less.

  3. Configure your Power Options to prompt for password when computer resumes from standby.

  4. Do not store confidential information on your laptop's hard drive (or on removable media including flash drives) without the approval of the Chief Information Security Officer (see note below). This includes but is not limited to, proprietary business information relating to Temple University and personal confidential information related to other employees, students, applicants, retirees, alumni and social security numbers.

    Note: If you store sensitive information on your laptop that could cause financial or reputational damage to the University if the laptop is lost or stolen, please contact the Help Desk and request a consultation with the Office of Information Security. The Office of Information Security has laptop encryption software that can be ordered for your laptop to protect your data in the event of loss or theft.

  5. Install Temple’s Symantec Endpoint Protection software.

  6. Use Temple's Virtual Private Network (VPN) software when remotely accessing Temple University Information Systems.

    Note: If you connect to Temple's TUsecure wireless network from on-campus, you do not need to use VPN software.

Wireless Network Usage

  1. Only connect to trusted and secure wireless networks.

  2. Disable file sharing.

  3. Never connect to an ad hoc network unless you have verified it is safe. Free wireless networks (Free WI-FI) are appearing in public places to include airports. Many of these free access points are un-trusted ad hoc networks that are set up to trap you and steal your information.

    a. To identify an ad hoc wireless network with Windows XP:

    i. Prior to selecting a network review the network's name and description.

    ii. An ad hoc network will be called “computer-to-computer” network.

    b. To identify an ad hoc wireless network with Widows Vista:

    i. Prior to selecting a wireless network review the network icon next to it on the
       “Connect to a Network” screen.

    ii. An ad hoc wireless network will have an icon with several computers.

Physical Security

  1. Do not leave your laptop unattended unless it is physically secure.

  2. Secure your laptop when you are not in your office. Lock your door and/or secure your laptop to the desk with a laptop cable.

  3. If you take your laptop home, be sure to keep it in a secure location.

  4. Do not leave your laptop in your car.

Traveling

  1. Verify you have your laptop, laptop case, including all contents, before leaving the plane, taxi or train.

  2. Keep your laptop in sight when going through airport security checkpoints.

  3. If you plan to connect to an Airport or Hotel wireless network please review “Wireless Network Usage” above.

  4. When you stay in a hotel, lock your laptop in your room safe if available.

  5. Do not leave your laptop in your rental car.

If your laptop is lost or stolen contact the Help Desk at 215-204-8000 immediately.


© Copyright 2012. Temple University.
All rights reserved.