Encrypt devices and data (2024)

Encrypt devices and data

In general, the University advises against storing sensitive University information on your computer. However, if you must store sensitive University information, you must encrypt it to ensure its confidentiality. Anyone who gains access to your computer or storage device—even an unauthorized user—is able to view, copy, or modify unencrypted sensitive information. Encrypting sensitive files will help you control who can view or use the files.

Encryption scrambles the file itself, rendering it meaningless on its own. The file only becomes meaningful when it is decrypted, which requires the correct password or key. Unauthorized users will still be able to copy encrypted files, but they will not be able to open or view them without the password or key.

Requirements

Faculty and staff should discuss encryption with their unit head or local support provider to find out what their unit's encryption requirements and plans are.

  • Encrypt University information according to your unit's encryption plan and using a strong password or key.
  • Encrypt any sensitive University information at rest on electronic storage media.
  • Encrypt portable IT devices (laptops, smartphones, tablets, and removable storage media such as external hard drives or USB flash drives) with whole disk encryption.
  • Provide copies of your encryption passwords or keys to the unit for escrow to ensure that the encrypted information is able to be decrypted in the event that you are unable to decrypt it yourself.
  • Use VPN to create encrypted connections to IT resources.
  • Ensure that sensitive University information is encrypted prior to transmitting it electronically. Use encrypted transmission protocols if it is not possible to encrypt sensitive University information prior to transmitting or receiving it.
  • Do not store or share encryption passwords or keys in a way that identifies the files they protect. If you need to share an encryption key with someone else, use a separate channel from the one you used to send the file (e.g., share the file as an attachment and the password over the phone).

General guidelines

  • Do not store sensitive information on your computer or electronic devices unless it is necessary to do so.
  • Encrypt all sensitive information that you must store.
  • Use a password that is complex and difficult to guess. Encryption only works so long as the password is kept secure.
  • If your device offers whole disk encryption, enable it to protect all of your information.
  • Some encryption software leaves unencrypted versions of files on your device. Be sure to securely erase these files to ensure that the unencrypted information is not recoverable.

External resources

Encrypting Personally Identifiable Information (UD IT help file)
Explains the tools approved for encrypting University information. Be aware that your unit may have different encryption requirements or practices.

Encryption Explained (Indiana University)
Introduces the basics of encryption and provides a look at what other universities are requiring.

Reasons to Encrypt Your Data (Kaspersky Lab)
Explains why encryption is important, even if you don't think you have anything information encrypting.

Encrypt devices and data (2024)
Top Articles
The Insider's Guide to Crafting a Winning Financial Newsletter
Everything You Need to Know About Authorization Holds | Chargebackhit.com
Northern Counties Soccer Association Nj
AMC Theatre - Rent A Private Theatre (Up to 20 Guests) From $99+ (Select Theaters)
Durr Burger Inflatable
Trevor Goodwin Obituary St Cloud
Craftsman M230 Lawn Mower Oil Change
Collision Masters Fairbanks
How To Get Free Credits On Smartjailmail
Nesb Routing Number
Best Cheap Action Camera
Best Restaurants In Seaside Heights Nj
Grand Park Baseball Tournaments
Jessica Renee Johnson Update 2023
Jscc Jweb
Aces Fmc Charting
Gwdonate Org
Curtains - Cheap Ready Made Curtains - Deconovo UK
Idaho Harvest Statistics
List of all the Castle's Secret Stars - Super Mario 64 Guide - IGN
Forum Phun Extra
Where Is George The Pet Collector
EASYfelt Plafondeiland
Samantha Aufderheide
O'Reilly Auto Parts - Mathis, TX - Nextdoor
Menus - Sea Level Oyster Bar - NBPT
Pirates Of The Caribbean 1 123Movies
Knock At The Cabin Showtimes Near Alamo Drafthouse Raleigh
Essence Healthcare Otc 2023 Catalog
Greensboro sit-in (1960) | History, Summary, Impact, & Facts
Is Holly Warlick Married To Susan Patton
R Baldurs Gate 3
The Collective - Upscale Downtown Milwaukee Hair Salon
Kuttymovies. Com
Dubois County Barter Page
Worlds Hardest Game Tyrone
404-459-1280
Today's Final Jeopardy Clue
Henry County Illuminate
Elizaveta Viktorovna Bout
Trivago Myrtle Beach Hotels
Second Chance Apartments, 2nd Chance Apartments Locators for Bad Credit
World Social Protection Report 2024-26: Universal social protection for climate action and a just transition
Lcwc 911 Live Incident List Live Status
Wasmo Link Telegram
Kent And Pelczar Obituaries
Gregory (Five Nights at Freddy's)
Memberweb Bw
Collision Masters Fairbanks
Metra Union Pacific West Schedule
Cool Math Games Bucketball
Predator revo radial owners
Latest Posts
Article information

Author: Pres. Lawanda Wiegand

Last Updated:

Views: 5524

Rating: 4 / 5 (51 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Pres. Lawanda Wiegand

Birthday: 1993-01-10

Address: Suite 391 6963 Ullrich Shore, Bellefort, WI 01350-7893

Phone: +6806610432415

Job: Dynamic Manufacturing Assistant

Hobby: amateur radio, Taekwondo, Wood carving, Parkour, Skateboarding, Running, Rafting

Introduction: My name is Pres. Lawanda Wiegand, I am a inquisitive, helpful, glamorous, cheerful, open, clever, innocent person who loves writing and wants to share my knowledge and understanding with you.