Fax
phones or in an emergency, as the transmissions
can be intercepted.
a) Use password protected screen savers, turn off
the computer, or log out of the network when
not at your desk.
b) Position screens so they are not visible to others.
c) Secure workstations and laptops with password.
a) Put fax machines in a safe location, not out in the
open or in a public or area with high-traffic or
easy access and visibility.
b) Use a cover sheet clearly identifying the intended
recipient and include your name and contact
information on the cover sheet.
c) Include a confidentiality statement on the cover
sheet of faxes that contain sensitive personal
data.
d) Do not include or reference sensitive personal
data on cover sheet.
e) Confirm fax number is correct before sending.
f) Send fax containing participant sensitive
personal data only when the authorized recipient
is available to receive it whenever possible.
g) Verify that fax was received by authorized
recipient; check the transmission report to
ensure correct number was reached and when
necessary contact the authorized recipient to
confirm receipt.
h) Deliver received faxes to recipient as soon as
possible. Do not leave faxes unattended at fax
machine.
Email
a) Do not include sensitive personal data in Subject-
line or in Body of email.
b) Transmit sensitive personal data only in a
password-protected attachment (MS Word and
MS Excel provide password protection).
c) Include a confidentiality statement on emails
that contain any sensitive personal data in email
attachments.
d) Do not send attachment passwords in the same
email as the attachment.
e) Include your contact information (name and
phone number minimum) as part of the email.
d) Change passwords on a regular basis.
e) Do not leave laptop or work-related participant
sensitive personal data visible or unsecured in a
car, home office, or in any public areas.
f) Ensure that all sensitive personal data used
outside work premises is protected using
appropriate measures such as locked desks, file
cabinets.
g) Never remove original copies of sensitive
personal data from the agency without your
supervisor’s approval for specific purposes.
h) Store files that contain sensitive personal data
on a secure server, not on your workstation hard
drive.
Disposal of sensitive personal data
a) Shred all hard copies containing sensitive
personal data when the copies are no longer
needed.
b) Place hardcopies to be recycled in locked recycle
bins if available.
c) Delete all soft copy files containing sensitive
personal data from your computer and from the
server when the information is no longer needed
within the record retention requirements.
d) Destroy all disks, CDs, etc., that contained
sensitive personal data before disposing them.
e) Do not reuse disks, CDs that contained sensitive
personal data without sanitizing them first.
f) Contact IT before transporting or transferring
equipment for proper procedures to move
equipment and to sanitize hard drives and other
media.
g) Return the sensitive personal data to the sender,
if this requirement is stipulated in any contractual
agreements. Work Areas
h) Do not leave sensitive personal data (files,
records, Rolodex, reports) exposed, open, or