Penn Computing

Penn Computing

Computing Menu Computing A-Z
Computing Home Information Systems & Computing Penn


Monday, July 28, 2014

  New Resources
Travel Tips for Data Security
Free Security/Privacy Training Resources
Two-step verification
Combating Malware
Phishing Archive
Cloud Computing and Data Outsourcing
Best Practices for Applications with Confidential University Data
  Security "Greatest Hits"
Managing Passwords
E-mail Harassment & Forgery
Hoaxes, frauds & scams
Wireless Networking
Encryption & digital signatures
  Best Practices
Secure desktop computing
Secure servers
Secure data deletion
Securing printers
Tips for safe computing
Computing policies
  More in-depth information for
Local support providers
System administrators
  Security initiatives
Critical host compliance
Authentication & authorization
Penn Security & Privacy Assessment (SPIA)
Security Liaisons (Restricted Access)
Secure Share
Secure Space
Vulnerability Scanner
  Related links
Electronic privacy
Worms, trojans, backdoors

One Step Ahead: Almanac Security Tips - 2014

In each issue, Penn's Journal of Record, The Almanac publishes helpful tips and hints for dealing with information security and privacy matters. This page is a collection of all those published thus far.
New! You can now receive new One-Step-Ahead Security and Privacy Tips automatically!
You can subscribe via Email or RSS.

Table of Contents (view all)

Heartbleed OpenSSL Vulnerability
Security and Privacy Tips for World Travelers
Filing Taxes Online This Year? Take Steps to Protect Your Information!
If your computer runs Windows XP, you must update it now!
Why Should You Report Security Incidents? And How Do You Report One?
Photo and Video Privacy Issues
The Password is Dead, Long Live the Password!
Data Privacy Month: NSA Surveillance Panel at the National Constitution Center
Protecting Your Finances During This Year’s Holiday Shopping Season
Beware of Phishing E-mails in the Wake of Typhoon Haiyan
No E-mail from Penn Will Ask For Your Username/Password or SSN
The Children's Online Privacy Protection Act: Does It Apply to Your Website?
October: National Cyber Security Awareness Month; Free Secure Disposal of Paper and Electronics
What Basic Rules Protect Student Information at Penn? (September 2013)
Protecting Privacy and Security on Penn + Box

Whats popular?

   security    hackers    wireless    privacy    SSNs    email    home computing    identity theft    passwords    software    virus    phishing    social networking        mobile devices    keyloggers    documents    www

Tuesday, May 11, 2010 - Almanac Vol. 56, No. 33

Warning: Your Printer & Copier May Store Your Confidential Data

By now you are probably smart enough to avoid carrying unencrypted sensitive data on portable devices; you use a complex password and you don’t share it with anyone; you save your important work to network drives and you keep your desktop and laptop current with antivirus software and updated security patches. But do you also dispose of, return to lessor, sell, or donate your printer or copier every few years? WAIT!

Though we don’t often think of it this way, more and more office devices—including multi-function office printers—come with hard drives. The data you print, copy, scan, or fax is stored on that hard drive and in some cases, stored permanently unless you and your LSP do something about it. At a minimum, be aware that when you dispose of your printer, fax, copier or scanner, there may be a hard drive containing images of all of your documents unencrypted. Have the hard drive securely wiped before you give the device away or sell it, or if the device’s hard drive is removable, remove the drive entirely and have it securely destroyed. While the device is still in use in your office, consider its physical location—a secured or monitored area is preferable.

If you have questions regarding these issues contact your LSP, or Purchasing Services at


Information Systems and Computing
University of Pennsylvania
Comments & Questions

Penn Computing University of Pennsylvania
Information Systems and Computing, University of Pennsylvania