Whole Disk Encryption

Data loss is a growing problem in the healthcare industry. Sites such as HealthcareInfoSecurity regularly publish news headlines about data breaches, and patient-related breaches are chronicled on Health and Human Services' "Wall of Shame" for institutions that have suffered breaches affecting 500 or more patients.

Screensaver Frequently Asked Questions

WCM is implementing a screensaver with a security feature that requires you to enter your password in order to resume use of the computer once the screensaver activates in order to comply with requirements for good security practices. Below are some frequently asked questions that deal with this topic.

Lock Your Desktop When You're Away

Why Should You Lock Your Desktop?

If you walk away from your computer and do not lock it or log off, it poses a security risk to you and the college. Someone can use your computer in an unauthorized way even if you are away for a few minutes, such as:

HIPAA and PHI

What is HIPAA?

HIPAA is the acronym for the Health Insurance Portability and Accountability Act that was passed by Congress in 1996.  HIPAA does the following:

Internet Safety and Fraud Protection

What is Internet Fraud?

Internet fraud is a serious problem that you will face both at work and at home. Criminals use a variety of methods to try and obtain sensitive information such as your CWID and password, Social Security Number, and credit card information, which can then be used to cause data breaches and perpetrate identity theft and other nefarious and illegal behavior. 

Peer-to-Peer and File Sharing Overview

What is Peer-to-Peer File Sharing?

Peer-to-peer (P2P) file sharing allows users to make files available for other users to download and use. When installed your computer, file sharing software enables others to download the user’s files onto their own computers.

Safeguard Your Data

It is important for you to understand how to secure the data that you work with at Weill Cornell. In addition to being familiar with ITS Security Policies, please check back regularly to find information on:

  • Handling different types of data
  • Sending and Receiving WCM Data
  • Safe Storage of WCM Data

Read the articles below to learn more about how to work safely: 

Report a Loss or Theft

Computing hardware (laptops, desktops, and mobile devices) are all vulnerable to theft on and off campus. Never leave your computer alone in a public area.

If a computer you use for work is stolen, report it immediately it to your department’s technical support staff. They will file a report with WCM Security. Do the same if you have lost any portable storage, such as external hard drives, USB thumb drives, CDs, DVDs, tapes, or diskettes.

Can I use data in the WCMC Directory to create an advanced report?

Yes. Please contact the Identity Management Team at idm@med.cornell.edu for assistance.

How does the WCM Directory integrate with the Emergency Notification System?

The Emergency Notification System (Everbridge) is used by WCM to alert our community during emergencies. The directory links to the Emergency Notification System and supplies the contact information used.

Be sure to enter all of your emergency contact information, including where you can be reached during off-hours (home telephone, cell phone). You can select "Emergency Only" in the "Publish To" dropdown menu if you do not want the contact information displayed to others in the directory. More information on the Emergency Notification System at WCM is available at https://emergency.weill.cornell.edu/UpdateWCA.