Responsible Office: Office of Cybersecurity
Last Review: 03/24/2021
Next Review: 03/24/2023
Contact: Chris Madeksho
To establish the minimum physical security requirements as well as responsibility for end-user UTHSC Information Technology (IT) Resources and related facilities/work areas.
This Practice applies to all UTHSC Information Technology (IT) Resources, end-users, and work areas.
UTHSC Information Technology (IT) Resource: Any data, device, or other component of the information environment that supports information-related activities. Assets generally include hardware (e.g. servers and switches), software (e.g. mission critical applications and support systems) and information.
UTHSC Workforce: employees, volunteers, trainees, and other persons whose conduct, in the performance of work for a covered entity or business associate, is under the direct control of such covered entity or business associate, whether or not they are paid by the covered entity or business associate.
UTHSC User is responsible for adhering to this practice and the security controls set forth in it. The Office of Cybersecurity is responsible for setting basic security standards for the IT Resource.
- To prevent unauthorized access, tampering, and/or theft of UTHSC IT Resources, UTHSC workforce members must secure their work area whenever they are not available to monitor the area.
- If leaving their device, users will lock the device by whatever means available for the operating system, i.e. using Ctrl+Alt+Delete or Windows+L for Windows devices.
- Devices will auto-lock after an inactivity period of ten (10) minutes.
- End-user UTHSC IT Resources must include physical access controls that limit physical access and protect the equipment when on-site, off-site, at home, or while in transit from one location to another.
- The IT Resource must be placed out of view or access of unauthorized individuals.
- Display devices, i.e. monitors, in public areas need to be equipped with privacy safeguards or located so that unauthorized individuals cannot easily observe displayed information.
- Physical security controls in clinical facilities must limit physical access to electronic information systems containing Personal Health Information (ePHI).
- Exceptions to this Practice should be requested using the process outlined in GP-001.02 Security Exceptions and Exemptions to ITS Standards and Practices.
- PE-001-Physical Security
- GP-001.02 Security Exceptions and Exemptions to ITS Standards and Practices.