Archive - Guidelines for Encryption of Sensitive Information
The purpose is to reduce the risk of a data exposure attributed to a WPI breach.
Encrypting sensitive information increases overall information security, mitigates some financial risk and meets compliance guidelines for state and federal regulations. By reducing the risk of a breach we reduce an individualís risk of data exposure which could expose one to identify theft. WPIís financial risk is also reduced by not having security breaches which could result in adverse negative publicity, adversely impact WPIís competitive advantage, and break non-disclosure & other legal agreements.
Data encryption has become a standard by the Commonwealth of Massachusetts Consumer and Business Regulation Division to protect personally identifiable information.
NOTE: This is an interim guideline pending a more complete solution made available and deployed by the WPI Information Technology Division. Followers of this guideline should expect other additional solutions will be made available.
The scope includes portable devices storing sensitive information. Portable devices include, but are not limited to, the following equipment.
- Laptops and other portable computers
- Desktops located off-campus
- Computers accessed by multiple people
- Computers lcoated in unsecured locations
- CDs, DVDs, and USB storage
WPI provides systems on the Administrative domain that can be used to encrypt specific directories and limit access to just that specific user on a system. This capability should be applied on high-risk systems like those that routinely leave the main campus, systems which have multiple users and computers in unsecured locations or large multi-person offices.
- Data Storage
Users who have or handle sensitive information should utilize a personal encrypted drive to store sensitive data. WPI supports TrueCrypt, an open-source solution. Encrypted containers using this software can reside on CD-ROMs, DVDs, and USB storage devices as well as on hard drives themselves. This is the recommended way of storing data in portable media for transport.
Questions and Help
For assistance, contact the Information Security Office at email@example.com.
December 2, 2008: The Information Technology Division endorsed this standard.Maintained by itweb
Last modified: Oct 13, 2009, 16:48 EDT