Computer Encryption FAQs (2024)

Table of Contents
What is computer encryption? Does Texas State computer encryption support self-encrypting drives? How secure is computer encryption? Why is computer encryption necessary? Should desktop and laptop computers both be encrypted? What steps do I take to complete the computer encryption process? Will my computer be encrypted if I leave campus? Will computer encryption affect my computer's performance? Can I take my computer home to complete the computer encryption process myself? What types of devices require computer encryption? Can faculty and staff opt out of computer encryption? When my computer is encrypted, do my files ever become unencrypted? If I travel internationally, will computer encryption cause any problems? If my computer is encrypted, is my data totally safe? I encrypted my Texas State-owned computer myself. How do I become Texas State computer encryption compliant? Once my computer is encrypted, can I store confidential information on it? Am I eligible to encrypt my personal computer through Texas State computer encryption? If I use software to back up my computer, will the backups be encrypted? Do computer encryption policies apply to tablet computers (iPad or Android devices)? If I copy files from my encrypted computer to an unencrypted external device, will the information still be encrypted? How is computer encryption different from the Virtual Private Network (VPN)? My computer is not a Windows or Mac. Should it still have computer encryption? Why does my encrypted Windows computer screen keep locking? Will computer encryption cause problems with any of the software application I use? What should I do if my encrypted computer is stolen or lost? Can faculty and staff select their own method of computer encryption for Texas State-owned computers?
  • What is computer encryption?

    Computer encryption (or whole disk encryption) is a technology that protects information on computers from unauthorized access. Encryption convertsdatainto unreadable code that cannot be easily deciphered. This protection is more extensive than typical security features, such as securing your system with a password or encrypting individual files.

  • Does Texas State computer encryption support self-encrypting drives?

    For Windows computers, BitLocker Drive Encryption is compatible with self-encrypting drives (OPAL).

  • How secure is computer encryption?

    BitLocker Drive Encryption uses AES 256-bit encryption. FileVault 2 uses full disk XTS-AES 128-bit encryption. Both satisfy all industry, state, and university computer encryption standards.

  • Why is computer encryption necessary?

    Computers pose a high security risk of data loss. Texas State must take all necessary precautions to protect sensitive and confidential information.

    If an unencrypted computer is lost or stolen, others may be able to recover some or even all of the information with little effort. Encryption is a method toprotect the data on your computer from theft, misuse, and loss.

  • Should desktop and laptop computers both be encrypted?

    Yes. Texas State is moving toward encrypting university-owned laptop and desktop computers.

  • What steps do I take to complete the computer encryption process?

    ITAC or your departmentTechnical Support Person can assistwithcomputer encryption.

  • Will my computer be encrypted if I leave campus?

    Yes. After the initial encryption setup, your computer will remain encrypted while on or off campus.

  • Will computer encryption affect my computer's performance?

    Encryption will cause a nominal reduction in performance that should not be noticed by the average user.

  • Can I take my computer home to complete the computer encryption process myself?

    No. ITAC or your department's Technical Support Person (TSP), must install encryption for you.

  • What types of devices require computer encryption?

    Both desktop and laptop computers should be encrypted. Regardless of operating system, all university-owned computers should be protected via encryption or by using an alternate method that has been approved using the Texas State Device Encryption Exception process.

  • Can faculty and staff opt out of computer encryption?

    Texas State-owned computers must be protected by BitLocker or FileVault. The only exception to this policy is by gaining approval thorugh the Texas State Device Encryption Exception Request process.

  • When my computer is encrypted, do my files ever become unencrypted?

    When you log into your computer, your data immediately becomes unencrypted so that you can access it. When you log out out of the computer or turn if off, it becomes encrypted again.

  • If I travel internationally, will computer encryption cause any problems?

    You have specific responsibility under export control regulations when you travel outside of the United States. If you are traveling outside of the United States with your computer, all data on your device (including proprietary information, confidential records, and encryption software) is subject to export control regulations.

    If you are planning to take your Texas State-owned computer outside of the USA, please contact the Office of Research Compliance for specific instructions. Additional information can be found on IT Security's information page on International Travel with Encryption.

  • If my computer is encrypted, is my data totally safe?

    When you are logged out, the data is encrypted and cannot be accessed without the login password. This is true even if the hard drive is moved to another computer or ifnormal system boot procedures are by passed.

    When you are logged into the computer, it is not encrypted at that time.Your data is still vulnerable to network attacks, password guessing, viruses, malware, and other types of compromises.

  • I encrypted my Texas State-owned computer myself. How do I become Texas State computer encryption compliant?

    Your computer will need to be unencrypted and re-encrypted using Texas State approved encryption methods. Contact ITAC for instructions on how to proceed.

  • Once my computer is encrypted, can I store confidential information on it?

    It is not advisable to store confidential information on your computer hard drive.There are business needs which require you to download or temporarily save confidential information on a computer; however, once your business task is complete, you should remove the confidential information from that computer.Ensure that you always remain compliant with UPPS 04.01.01.

  • Am I eligible to encrypt my personal computer through Texas State computer encryption?

    Texas State's encryption program is intended for university-owned computers.

    Multiple software applications exist to encrypt your personal Windows computer. Mac computers OS 10.7 (Lion) or later automatically have FileVault 2 installed but not activated.

    NOTE:Never store Texas Stateconfidential information on personally-owned computers.

  • If I use software to back up my computer, will the backups be encrypted?

    No. Backup software must have its own encryption solution. Any data accessed by software, including backup software, will be transparently unencrypted before use. If the backups contain confidential information, be sure the backup media or files are encrypted.

  • Do computer encryption policies apply to tablet computers (iPad or Android devices)?

    No. Be advised that you should never store confidential university data on these types of devices.

  • If I copy files from my encrypted computer to an unencrypted external device, will the information still be encrypted?

    Any data that is copied to an unencrypted external device or location that is not encrypted will not be protected. Texas State policy does not allow the storage of confidential information in an unencrypted location.

    Examples ofunacceptablestorage locations for university confidential information:

    • Unencrypted thumb drive or flash drive
    • CD/DVD
    • Cloud storage (examples: DropBox,iCloud, or OneDrive)
    • Unencrypted Smart Device (tablets, iPads or Android devices)

    Examples ofacceptablestorage locations for university confidential information:

    • Encrypted thumb drive or flash drive (e.g., IronKey)
    • Encrypted external hard drive (e.g., Apricorn Aegis Padlock)
  • How is computer encryption different from the Virtual Private Network (VPN)?

    Computer encryption protects the data stored on your hard drive. The VPN protects data traveling from one Internet connection to another.

  • My computer is not a Windows or Mac. Should it still have computer encryption?

    Computers with operating systems other than Windows or Mac (e.g., Linux OS) must have a completed and approved Texas State Device Encryption Exception Request on file.

  • Why does my encrypted Windows computer screen keep locking?

    Windows 7 computers that use McAfee Endpoint Encryption are configured to lock Windows computer screens after 15 minutes of inactivity (e.g., no keyboard or mouse clicks).

    Windows 10 computers are encrypted with BitLocker Drive Encryption and can be configured to lock the computer based upon the individual user's preference.

    NOTE:Computers are only protected when locked. If a computer is unlocked and inactive, the data is unprotected, vulnerable, and in an unencrypted state.

  • Will computer encryption cause problems with any of the software application I use?

    Encryption should not cause problems with software, and you should not see signs that the computer is encrypted.

    Because of the level of security that encryption provides to computer data, using data migration tools like Apple’s Migration Assistant to transfer files between two computers may not function properly. Please use alternative methods of migrating data and settings from one computer to another.

  • What should I do if my encrypted computer is stolen or lost?

    If your computer is lost or stolen, immediately contact your department head. The department head must report suspected or actual losses or theft of property first to the University Police Department (UPD), then to the Director of Materials Management.

    IT Security is responsible for investigating any loss or exposure of university confidential information, and they will notify additional state agencies if necessary. See UPPS 05.01.01 for more information.

    If a theft occurs while you are away from campus, contact the local authorities to report the incident.

  • Can faculty and staff select their own method of computer encryption for Texas State-owned computers?

    No. Texas State-owned computers should adhere to the officialuniversity computer encryption solutions:

    • File Vault 2 for Mac
    • BitLocker for Windows

    Texas State must be able to demonstrate that all data residing on a lost or stolen computer was encrypted when the computer disappeared. Otherwise, confidential data on the computer may be considered exposed and all regulatory notification requirements must be met.

  • Computer Encryption FAQs (2024)
    Top Articles
    Create a journal entry in QuickBooks Desktop for Windows or Mac
    Science of meat - Times of India
    Devin Mansen Obituary
    Where To Go After Howling Pit Code Vein
    Srtc Tifton Ga
    Craigslist Cars Augusta Ga
    Here's how eating according to your blood type could help you keep healthy
    Kagtwt
    Mid90S Common Sense Media
    Summoner Class Calamity Guide
    Sport-News heute – Schweiz & International | aktuell im Ticker
    Cyndaquil Gen 4 Learnset
    Ups Access Point Lockers
    Grayling Purnell Net Worth
    Mission Impossible 7 Showtimes Near Marcus Parkwood Cinema
    Long Island Jobs Craigslist
    Brazos Valley Busted Newspaper
    R Baldurs Gate 3
    Leben in Japan – das muss man wissen - Lernen Sie Sprachen online bei italki
    O'reilly's In Monroe Georgia
    Courtney Roberson Rob Dyrdek
    Sam's Club Gas Price Hilliard
    What does wym mean?
    Metro By T Mobile Sign In
    Slv Fed Routing Number
    Indiana Immediate Care.webpay.md
    #1 | Rottweiler Puppies For Sale In New York | Uptown
    Louisville Volleyball Team Leaks
    Build-A-Team: Putting together the best Cathedral basketball team
    Can You Buy Pedialyte On Food Stamps
    Game8 Silver Wolf
    9781644854013
    Stanford Medicine scientists pinpoint COVID-19 virus’s entry and exit ports inside our noses
    When His Eyes Opened Chapter 2048
    Kelley Blue Book Recalls
    Uvalde Topic
    craigslist: modesto jobs, apartments, for sale, services, community, and events
    Anhedönia Last Name Origin
    Dcilottery Login
    Craigs List Hartford
    Pokemon Reborn Gyms
    Panolian Batesville Ms Obituaries 2022
    Craigslist Antique
    National Weather Service Richmond Va
    Eat Like A King Who's On A Budget Copypasta
    Enr 2100
    Kjccc Sports
    Pas Bcbs Prefix
    Walmart Front Door Wreaths
    Barber Gym Quantico Hours
    Cars & Trucks near Old Forge, PA - craigslist
    Craigslist Monterrey Ca
    Latest Posts
    Article information

    Author: Gregorio Kreiger

    Last Updated:

    Views: 6580

    Rating: 4.7 / 5 (57 voted)

    Reviews: 88% of readers found this page helpful

    Author information

    Name: Gregorio Kreiger

    Birthday: 1994-12-18

    Address: 89212 Tracey Ramp, Sunside, MT 08453-0951

    Phone: +9014805370218

    Job: Customer Designer

    Hobby: Mountain biking, Orienteering, Hiking, Sewing, Backpacking, Mushroom hunting, Backpacking

    Introduction: My name is Gregorio Kreiger, I am a tender, brainy, enthusiastic, combative, agreeable, gentle, gentle person who loves writing and wants to share my knowledge and understanding with you.