Last modified: March 14, 2025
Policy No. 4204 Clean Desk Procedure
Overview
The purpose of this procedure is to establish a culture of security for all PCSD employees. An effective clean desk effort, involving the participation and support of all employees, will protect paper documents that contain personally identifiable and other sensitive information about students, educators, and staff.
Purpose
The primary reasons for a clean desk procedure are:
- A clean desk reduces the threat of a security incident since confidential information will be locked away when unattended.
- Sensitive documents left in the open can be viewed and/or stolen by a malicious entity.
Scope/Responsibility
All staff, employees, and entities working on behalf of PCSD with a district-owned or personal device connected to the PCSD network are subject to this procedure.
Procedure
Appropriate measures must be taken when using workstations to ensure the confidentiality, integrity, and availability of sensitive information, including but not limited to Personally Identifiable Information (PII). Appropriate measures include:
- Restricting physical access to devices.
- Ensuring that all sensitive/confidential information in hardcopy or electronic form is secured in the work area at the end of each day.
- Securing workstations (screen lock or logout) prior to leaving an area to prevent unauthorized access.
- Enabling a password-protected screen saver with a short timeout period to ensure that devices left unsecured will be protected.
- Complying with all applicable password policies and procedures. See PCSD’s Password Procedure.
- Ensuring devices are used for authorized educational/business purposes only.
- Never sending PII via email to anyone, including forwarding a message.
- Storing all sensitive information on password-protected drives or secure, restricted network servers.
- Securing laptops that contain sensitive information by:
- Using cable locks.
- Locking laptops up in drawers or cabinets.
- Locking the door behind you.
- Sensitive working papers should be placed in locked drawers whenever a user is away from their desk.
- At the end of the workday, the employee is expected to tidy their desk by locking up all sensitive papers and devices.
Last Update Status:
Updated January 2015
Related Policies and Procedures
- 4204 Acceptable Use
- 4204 Audit
- 4204 Clean Desk
- 4204 Disaster Recovery Plan
- 4204 Email
- 4204 Employee Security Awareness Training
- 4204 Encryption
- 4204 Password
- 4204 Remote Access
- 4204 Router and Switch Security
- 4204 Security for Sensitive Workstations
- 4204 Security Response Plan
- 4204 Server Security
- 4204 Software Installation
- 4204 Website Services Security
- 4204 Wireless Device Communication
- 4204 Wireless Infrastructure Communication