{"id":10,"date":"2024-09-25T15:35:40","date_gmt":"2024-09-25T15:35:40","guid":{"rendered":"https:\/\/libraries.mit.edu\/records-management\/?page_id=10"},"modified":"2024-11-15T21:48:05","modified_gmt":"2024-11-15T21:48:05","slug":"storage","status":"publish","type":"page","link":"https:\/\/libraries.mit.edu\/records-management\/tips-best-practices\/storage\/","title":{"rendered":"Storage of records"},"content":{"rendered":"<h2>Digital storage tips<\/h2>\n<ul>\n<li>Store records in systems that are approved (and backed up) by IS&amp;T:\n<ul>\n<li>Use OneDrive and personal MIT Google Drive accounts for your own working documents not yet shared with your team or other Institute colleagues.<\/li>\n<li>Use SharePoint and shared drives for shared team documents.<\/li>\n<li>Use MIT email accounts to conduct Institute business.<\/li>\n<li>Remember that Outlook is not a storage system.<\/li>\n<\/ul>\n<\/li>\n<li>Protect records from unauthorized access, alteration, and deletion:\n<ul>\n<li>Ensure that only authorized employees have access to information systems.<\/li>\n<li>Use the <a href=\"https:\/\/libraries.mit.edu\/records-management\/tips-best-practices\/offboarding\/\">offboarding checklist<\/a> and remember to manage access as roles change.<\/li>\n<li>Review <a href=\"https:\/\/infoprotect.mit.edu\/tools\">Information Protection support, training, and resources.<\/a><\/li>\n<li>Comply with the requirements of the <a href=\"https:\/\/infoprotect.mit.edu\/\">Written Information Security Program (WISP).<\/a><\/li>\n<li>Learn how to <a href=\"https:\/\/infoprotect.mit.edu\/dirt\">identify and report an information security breach.<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Onsite storage tips<\/h2>\n<ul>\n<li>Store active records onsite in a secure, stable environment.<\/li>\n<li>Use lockable file cabinets and desk drawers to store <a href=\"https:\/\/infoprotect.mit.edu\/risk-classifications\">medium and high risk information<\/a>.\n<ul>\n<li>Be mindful of who has access to your work areas and lock them when unattended. &#8220;Two lock&#8221; storage is best: a lockable drawer within a lockable work area provides an added layer of security.<\/li>\n<\/ul>\n<\/li>\n<li>Think twice before storing files in closets, attics, basements, or storage rooms that are not in (or adjacent to) your office.\n<ul>\n<li>It can be difficult to control who has access to these spaces, especially if they\u2019re shared by multiple departments. Remote spaces, particularly basements, can become too humid or flood without your notice, damaging or destroying files.<\/li>\n<li>Consider offsite storage at Iron Mountain instead.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Offsite Storage at Iron Mountain<\/h2>\n<p>Iron Mountain provides secure <a href=\"\/records-management\/storage\/offsite-storage\/\">offsite storage<\/a> for MIT\u2019s inactive non-permanent paper records, allowing you to reclaim office space and recall \u2013 or request scans of \u2013 documents on demand.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital storage tips Store records in systems that are approved (and backed up) by IS&amp;T: Use OneDrive and personal MIT Google Drive accounts for your own working documents not yet shared with your team or other Institute colleagues. Use SharePoint and shared drives for shared team documents. Use MIT email accounts to conduct Institute business. Remember that Outlook is not a storage system. Protect records from unauthorized access, alteration, and deletion: Ensure that only authorized employees have access to information systems. Use the offboarding checklist and remember to manage access as roles change. Review Information Protection support, training, and resources. [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":144,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/page.php","meta":{"footnotes":""},"class_list":["post-10","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/libraries.mit.edu\/records-management\/wp-json\/wp\/v2\/pages\/10","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/libraries.mit.edu\/records-management\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/libraries.mit.edu\/records-management\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/libraries.mit.edu\/records-management\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/libraries.mit.edu\/records-management\/wp-json\/wp\/v2\/comments?post=10"}],"version-history":[{"count":10,"href":"https:\/\/libraries.mit.edu\/records-management\/wp-json\/wp\/v2\/pages\/10\/revisions"}],"predecessor-version":[{"id":216,"href":"https:\/\/libraries.mit.edu\/records-management\/wp-json\/wp\/v2\/pages\/10\/revisions\/216"}],"up":[{"embeddable":true,"href":"https:\/\/libraries.mit.edu\/records-management\/wp-json\/wp\/v2\/pages\/144"}],"wp:attachment":[{"href":"https:\/\/libraries.mit.edu\/records-management\/wp-json\/wp\/v2\/media?parent=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}