Global Health Center

Safe Computing Guidelines

The purpose of this document is to provide the Yeshiva University Community with a set of safe computing guidelines that ought to be followed before, during and after international travel in order to protect and secure University-owned data.  Protecting University-owned data is everyone's responsibility; adherence to these guidelines helps to ensure that you are doing your part to safeguard our data against unauthorized access.

Before You Travel

  • Determine whether device or media is an absolute necessity while you are travelling
  • Install Full Disk Encryption (FDE) Software on your device.  There are various products available on the market. Truecrypt encryption software is available for free on the Internet: www.truecrypt.org 
  • University Employees and Faculty may use the University's ITS Department FDE Solution, WinMagic SecureDoc.  Please contact infosec@yu.edu if you are interested in encrypting your device(s)
  • Some countries ban or impose limitations on encryption; before you travel be sure to verify the rules imposed by the country you are visiting.  For country specific travel information go to:  travel.state.gov 
  • Password protect all devices using strong passwords
  • Remove saved passwords
  • Clear your browser cache files
  • Inventory your data in order to be able to ascertain your exposure if your device is lost or stolen
  • Securely delete sensitive data that is stored on your device
  • Securely back up data stored on your device
  • Disable remote connectivity such as Bluetooth, Wi-Fi, and file sharing
 

While Traveling

  • University Employees and Faculty are encouraged to use the University's Virtual Private Network (VPN), which provides an encrypted (secure) path to access the Internet.  If you do not have a VPN account you may submit a request to the ITS Help Desk.  Request forms are available at www.yu.edu/ITS/Services/Request-Forms/ 
  • Avoid or limit use of public wireless, kiosk computers or public workstations
  • Do not download software updates on hotel internet connections or other public network connections
  • Always lock your screen when not using your device:
    • On a Windows system, press Control-Alt-Delete and select Lock Computer from the list of options. When you return, you can unlock the computer with your login name and password
    • On a Macintosh OS X system, in the Security section of the System Preferences panel, select the check box beside "Require password to wake this computer from sleep or screen saver." Then go to the Desktop and Screen Saver section of the System and Preferences panel and turn on a screen saver
  • Report lost or stolen device to local authorities and to the University
  • If your device has been lost or stolen as soon as feasible change the password for all the systems you access (personal and work related)
  • Do  not allow others to use your device or to connect a USB or portable device to your laptop or any other mobile devices
  • As best as possible keep your device with you at all times
  • While on your trip routinely run checks for viruses and other malicious software
 

When You Return

  • The first rule of thumb after you return is to assume that your electronic devices could have been compromised
  • Check your computer and other devices for spyware, malware, and viruses before connecting to the University's Network
  • Run a full in-depth scan for malware, using anti-virus and anti-spyware tools
Click here to log in