Skip to main content

Cornell University

Checklist for Data Cleanup

This article applies to: Security Essentials for IT Professionals

Implementing a data cleanup process is more involved than just choosing the proper scan tool. Use the information in this section to help you prepare for data cleanup.

  • Sources of Confidential Data: In which roles and activities are people most likely to create or handle confidential data? Knowing how and where confidential data is found can help set priorities.
  • Data Handling Approaches: What are the options for storing confidential data? Strengths and weaknesses of each? Design practices to keep confidential data secure, taking into account data types, access needs, and storage options.
  • Cornell's Tool - Spirion: Read about common scenarios and remediation options.
  • Locations to Search: What locations need to be scanned for confidential data? Tips for scanning external drives, thumb drives, network file shares, and other environments.
  • Scanning Email: What challenges does scanning email create?
  • Before You Scan: Checklist.
  • After You Scan: Checklist.
  • Confidential Data Types: What types of confidential data are the focus of the data cleanup effort? Get additional details about confidential data.
  • Encryption: What are the options for encryption? Strengths and challenges of each?

Comments?

To share feedback about this page or request support, log in with your NetID

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.