Office of Information Technology

Institutional Review Board Security & Privacy Checklist

Mobile Icon

Storing data on a mobile phone?

  1. Where possible, obfuscate or avoid using any personally identifiable information.
  2. Password protect any document related to your research as an added defense layer. Please see the online Microsoft Word password protection instructions.
  3. Use caution, if connecting to the Internet via a public wireless service such as an "Internet Café" or "Hotel" service to upload documents to your "private e-mail." Cyber criminals often monitor and intercept unprotected wireless traffic.

    How do you protect yourself?
    • Ensure that the web page you are typing your login credentials (username and password) into uses SSL (secure socket layers). You will know this by looking at the web page address. It should begin with https:// and several browsers, for example Internet Explorer, illustrate that a web page uses SSL by adding an icon of a locked lock at the end of the web page address field.

    • Consider changing your password more frequently than you normally would to protect your e-mail access should a cyber criminal discover your credentials, when you figure it out your credentials have been exposed (if you do), it will be too late.

    • Remember to create strong passwords. Combine mixed case and a symbol or two and make the password as long as possible at least 8 characters. Avoid using words found in any language found in any dictionary.

 

>> Back to Checklist