Security and Privacy Tips for World Travelers
Filing Taxes Online This Year? Take Steps to Protect Your Information!
If your computer runs Windows XP, you must update it now!
Why Should You Report Security Incidents? And How Do You Report One?
Photo and Video Privacy Issues
The Password is Dead, Long Live the Password!
Data Privacy Month: NSA Surveillance Panel at the National Constitution Center
Protecting Your Finances During This Year’s Holiday Shopping Season
Beware of Phishing E-mails in the Wake of Typhoon Haiyan
No E-mail from Penn Will Ask For Your Username/Password or SSN
The Children's Online Privacy Protection Act: Does It Apply to Your Website?
October: National Cyber Security Awareness Month; Free Secure Disposal of Paper and Electronics
What Basic Rules Protect Student Information at Penn? (September 2013)
Protecting Privacy and Security on Penn + Box
Security Starts With You
Tuesday, May 11, 2010 - Almanac Vol. 56, No. 33
Warning: Your Printer & Copier
May Store Your Confidential Data
By now you are probably smart enough to avoid carrying unencrypted sensitive data on portable devices; you use a complex password and you don’t share it with anyone; you save your important work to network drives and you keep your desktop and laptop current with antivirus software and updated security patches. But do you also dispose of, return to lessor, sell, or donate your printer or copier every few years? WAIT!
Though we don’t often think of it this way, more and more office devices—including multi-function office printers—come with hard drives. The data you print, copy, scan, or fax is stored on that hard drive and in some cases, stored permanently unless you and your LSP do something about it. At a minimum, be aware that when you dispose of your printer, fax, copier or scanner, there may be a hard drive containing images of all of your documents unencrypted. Have the hard drive securely wiped before you give the device away or sell it, or if the device’s hard drive is removable, remove the drive entirely and have it securely destroyed. While the device is still in use in your office, consider its physical location—a secured or monitored area is preferable.
If you have questions regarding these issues contact your LSP, or Purchasing Services at firstname.lastname@example.org.