Critical Incident Management

 < Day Day Up > 


In protecting individual workstations, including mobile computing devices such as laptops, notepads, and personal digital assistants, there is an old saying that the best defense is a good offense.

Having proactive procedures will help ensure security and privacy, and minimize the risks associated with computer operations. Workstation security can be assured by having standard hardware and software configurations, maintenance, and disposal policies and procedures. The following steps are general while course deviations should be addressed on an individual basis:

Experience Note 

Several years ago, a government agency sold its antiquated equipment at auction. To the agency's horror, the recipients quickly discovered they could unerase and unformat the hard drives and related media, recovering the agency's data. Untold embarrassment ensued.


 < Day Day Up > 

Категории