O'Reilly logo

Privacy What Developers and IT Professionals Should Know by J. C. Cannon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Physical Security

One of the most rudimentary ways to protect sensitive data is to provide physical security for the computers that hold the data. Physical security includes keeping computers in a locked, monitored area with limited, tracked access. Only people on the access list should be allowed access to the data center. Review access lists at least once a month to ensure that each person on the list still requires access. Monthly should be a good enough interval, because assignment changes typically do not occur more often than that. Anytime an employee leaves the company, all of the employee's computer accounts and building-access permissions should be revoked right away. In some cases, you may want to revoke access before the employee is ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required