Role: User

  • Secure deletion

    Securely delete information when it is no longer required by means that make it impossible to reconstruct the records.

  • Copiers & shared devices

    Remove information on copiers, fax machines, or other shared devices promptly.

  • Mailing physical media

    Use appropriately secure means when transferring physical media containing information. Track transfers to confirm that they reached the intended recipient.

  • Limit physical access

    Limit physical access to organizational systems, equipment, and the respective operating environments to authorized individuals.

  • Incident Reporting

    Promptly report actual or suspected compromise, including loss, theft, improper use, modification of, or access to information to security@mit.edu.

  • Security by design

    If you are developing (or contracting a vendor to develop) applications processing this level of information, include security as a design requirement.

  • Code review

    If you are developing (or contracting a vendor to develop) applications processing this level of information, review code and correct flaws prior to deployment.

  • Annual Review

    Contact security@mit.edu for an annual review to verify that all security tasks are working properly.

  • Sponsored research

    If you have received data as part of a sponsored research project, and your contract includes clauses on data security there may be additional tasks. Please contact infoprotect@mit.edu.

  • Payment processing

    If you are accepting credit card payments, you may need to complete additional tasks. Please contact infoprotect@mit.edu