{"id":92,"date":"2007-10-31T09:32:15","date_gmt":"2007-10-31T09:32:15","guid":{"rendered":"http:\/\/www.sentrylink.com\/blog\/2007\/10\/31\/records-security-is-your-job\/"},"modified":"2021-06-29T12:40:43","modified_gmt":"2021-06-29T16:40:43","slug":"records-security-is-your-job","status":"publish","type":"post","link":"https:\/\/www.sentrylink.com\/blog\/2007\/10\/31\/records-security-is-your-job\/","title":{"rendered":"Records security is your job"},"content":{"rendered":"<p>Here&#8217;s a <a href=\"http:\/\/www.msnbc.msn.com\/id\/21311881\/\">chilling story from MSNBC<\/a>:<\/p>\n<blockquote><p>Two laptop computers with detailed personal information about commercial drivers who transport hazardous materials across the United States are missing and considered stolen. The laptops belong to a contractor working for the Transportation Security Administration and contain the names, addresses, birthdays, commercial driver&#8217;s license numbers and, in some cases, Social Security numbers of 3,930 people, according to an Oct. 12 letter from TSA to lawmakers.<\/p><\/blockquote>\n<p>It seems like we see a story like this every few weeks. Sensitive personal information, including payroll records, social security numbers and the results of <a href=\"https:\/\/www.sentrylink.com\/web\/criminal-check.action\">criminal background checks<\/a> and credit checks are put on a laptop. Then, the laptop is lost or stolen and the people whose information was on it find out that they&#8217;re at risk.<\/p>\n<p>You&#8217;ve got sensitive information about the people who work for you. You&#8217;ve got their personnel records. You&#8217;ve got the results of background and credit checks for employees and people you&#8217;ve considered hiring. You also have records on your customers and prospects. You&#8217;re responsible for keeping those records secure.<\/p>\n<p>Use the available technological tools. Use passwords to keep records out of reach of the casual browser. Use encryption to make them even more secure.<\/p>\n<p>Treat your entire computer like a sensitive record. Keep it safe. Chain it down. If it&#8217;s hooked up to another computer or to a network or the internet, make sure you&#8217;ve got cybersecurity systems in place and working.<\/p>\n<p>If you must put sensitive records on a laptop make sure you keep the laptop safe. Have specific security procedures for laptops. Make sure your people use the procedures.<\/p>\n<p>If you&#8217;re not doing so already, make sure you&#8217;re doing background and credit checks on people with access to sensitive information. That includes anyone with access to computers that hold sensitive information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here&#8217;s a chilling story from MSNBC: Two laptop computers with detailed personal information about commercial drivers who transport hazardous materials across the United States are missing and considered stolen. The laptops belong to a contractor working for the Transportation Security Administration and contain the names, addresses, birthdays, commercial driver&#8217;s license numbers and, in some cases, Social Security numbers of 3,930 people, according to an Oct. 12 letter from TSA to lawmakers. It seems like we see a story like this every few weeks. Sensitive personal information, including payroll records, social security numbers and the results of criminal background checks and credit checks are put on a laptop. Then, the laptop is lost or stolen and the people whose information was on it find out that they&#8217;re at risk. You&#8217;ve got sensitive information about the people who work for you. You&#8217;ve got their personnel records. You&#8217;ve got the results of background and credit checks for employees and people you&#8217;ve considered hiring. You also have records on your customers and prospects. You&#8217;re responsible for keeping those records secure. Use the available technological tools. Use passwords to keep records out of reach of the casual browser. Use encryption to make them even more  [&#8230;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[12],"tags":[],"class_list":["post-92","post","type-post","status-publish","format-standard","hentry","category-privacy"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sentrylink.com\/blog\/wp-json\/wp\/v2\/posts\/92","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sentrylink.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sentrylink.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sentrylink.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sentrylink.com\/blog\/wp-json\/wp\/v2\/comments?post=92"}],"version-history":[{"count":1,"href":"https:\/\/www.sentrylink.com\/blog\/wp-json\/wp\/v2\/posts\/92\/revisions"}],"predecessor-version":[{"id":255,"href":"https:\/\/www.sentrylink.com\/blog\/wp-json\/wp\/v2\/posts\/92\/revisions\/255"}],"wp:attachment":[{"href":"https:\/\/www.sentrylink.com\/blog\/wp-json\/wp\/v2\/media?parent=92"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sentrylink.com\/blog\/wp-json\/wp\/v2\/categories?post=92"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sentrylink.com\/blog\/wp-json\/wp\/v2\/tags?post=92"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}