Policy No: 2015 Responsible Office: Office of Information Security Last Review Date: 03/23/2020 Next Required Review: 03/23/2023
Public Use Computer Signage Policy
To reduce risk of confidential data exposure, all departments that have public or lab computers will place appropriate signage near all publicly accessible computers.
This policy applies to all University Division employees (except for USA Health) who have and/or are responsible for publicly accessible computers in their areas.
Confidential Data: Any data attributable to the identity of a person, and will include all the types of data such as Protected Health Information (PHI), Sensitive Personally Identifying Information (PII) such as SSN, tax ID number, DL or state-issued ID number, passport number, military ID number, or any other unique ID number issued on a government document and Personally Identifiable Information for Education Records, attributable to any USA employee, student (or student parent), patient, trustee, contractor, vendor, agent, or customer.
4. Policy Guidelines
USA provides access to computer resources in departmental labs, university libraries, and other publicly accessible locations throughout campus. Those persons using these resources must adhere to all policies of the University of South Alabama regarding the use of computers and computer networks.
If a user or student walks away from a public computer while still logged into PAWS, or any system that has confidential data (bank, financial, SSN, health insurance, etc.), the student’s information may be at risk to being modified and/or copied.
Required Signage. To mitigate this risk, all departments that have public or lab computers will place the below signage near all publicly accessible computers:
To protect your personal and confidential information:
- DO NOT leave this computer unattended;
- Log out of PAWS or any system that stores your personal or confidential information;
- Close all web browsers!
If appropriate signage near all publicly accessible computers is not displayed or posted, the Computer Center or Information Security will contact the department head.
7. Related Documents